0mWindyBug / PnpNotifyResearch
a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification
☆11Updated 10 months ago
Alternatives and similar repositories for PnpNotifyResearch:
Users that are interested in PnpNotifyResearch are comparing it to the libraries listed below
- ☆23Updated last year
- ☆14Updated 4 years ago
- ☆32Updated last year
- An example code of CiGetCertPublisherName☆14Updated 2 years ago
- Stealing signatures from pe files☆16Updated 2 years ago
- Register a callback from a Manually mapped kernel module☆15Updated 2 years ago
- mash hypervisor host pml4☆15Updated 2 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- ☆24Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆18Updated 2 years ago
- ☆12Updated 9 months ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆14Updated 4 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated last year
- A poc that abuses Enclave☆36Updated 2 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated 7 months ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆16Updated 2 years ago
- Experiment to use sections as User/Kernelmode comm vector☆21Updated last year
- ☆15Updated 2 years ago
- simply manual map any system image☆16Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆28Updated 2 years ago
- POC kernel driver with hidden system thread☆13Updated 8 months ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- x64 assembler library☆32Updated 7 months ago
- ☆23Updated 10 months ago
- ☆15Updated 3 years ago
- Protected Process Light Library☆18Updated 4 years ago