0xGREG / registry-callbacks
UM-KM Communication using registry callbacks
☆39Updated 4 years ago
Alternatives and similar repositories for registry-callbacks:
Users that are interested in registry-callbacks are comparing it to the libraries listed below
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- ☆40Updated 3 years ago
- 将驱动映射到会话空间☆34Updated 2 years ago
- ☆50Updated 2 years ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- ☆47Updated last year
- ☆31Updated 2 years ago
- ☆44Updated 4 years ago
- ☆71Updated 2 years ago
- Windows Kernel Misc☆23Updated last year
- ☆27Updated last year
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago
- clearing traces of a loaded driver☆46Updated 2 years ago
- ☆48Updated last year
- POC kernel driver with hidden system thread☆13Updated 8 months ago
- ☆47Updated 2 years ago
- ☆29Updated 4 months ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- mouseclassservicecallback detection via hook☆49Updated 2 years ago
- A simple MmCopyMemory hook.☆36Updated 2 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆16Updated last year
- kinda custom data ptr swap communication method☆25Updated last year
- fecurity executor from factory☆33Updated 2 years ago
- x64 manual mapper using inline syscalls☆7Updated 3 years ago
- ☆67Updated last year
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- ☆45Updated 2 years ago
- page table manipulation to gain physical r/w☆42Updated 8 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆72Updated last year
- Discarded Section Manual Map☆67Updated 4 years ago