Skip to content
View xkhack's full-sized avatar
  • ChiNa

Block or report xkhack

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
xkhack/README.md

学习中:VT虚拟化中

Learning: VT virtualization

熟悉:windows内核、PE结构、WIN32API、附加、硬件编码、HOOK

Familiar with: Windows kernel, PE structure, win32API, additional, hardware coding, hook

年少轻狂,现已经脱坑,转入安全岗。

He is young and frivolous. Now he has taken off the pit and transferred to the safety post.

留下联系方式仅限于技术交流,请灰产人员不要询问如何绕过反作弊或则如何过某检测相关问题。

The contact information left is limited to technical exchange. Please don't ask the ash production personnel how to bypass anti cheating or how to pass a certain test.

Telegram:CnHack2022

Enigma:CnHack2021

Popular repositories Loading

  1. CrossFire_x64 CrossFire_x64 Public

    仅供参考研究,下载者使用产生的一切后果均自行承担!

    C++ 12 6

  2. IAT_mapping_kernel_injection IAT_mapping_kernel_injection Public

    通过IAT手动映射内核模式||Manually map kernel mode through IAT

    C++ 6

  3. BattlEye_shellcode BattlEye_shellcode Public

    模拟BattlEye扫描的shellcode

    C++ 5 3

  4. Kernel_Pass-Screenshot Kernel_Pass-Screenshot Public

    仅供参考,还有很多种内核中去防止截图的方式

    C 5 4

  5. Registry_read_write_driver Registry_read_write_driver Public

    简单的注册表读写驱动实例源码

    C 5 1

  6. Kernel_syscall Kernel_syscall Public

    通过内核进行syscall通讯,至于作用可以脑补

    C 2 1