Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999
☆241Nov 6, 2019Updated 6 years ago
Alternatives and similar repositories for WinAltSyscallHandler
Users that are interested in WinAltSyscallHandler are comparing it to the libraries listed below
Sorting:
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 4 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Hyper-V Research is trendy now☆199May 6, 2024Updated last year
- ☆125May 23, 2020Updated 5 years ago
- Load self-signed drivers without TestSigning or disable DSE. Transferred from https://github.com/DoubleLabyrinth/Windows10-CustomKernelSi…☆783Jan 22, 2020Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- Toolkit for Hyper-V security research☆158Mar 7, 2022Updated 4 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- Reverse engineered source code of the autochk rootkit☆210Nov 1, 2019Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆65Jun 19, 2019Updated 6 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- C++ Exceptions in Windows Drivers☆222Dec 21, 2020Updated 5 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- ☆69Dec 17, 2020Updated 5 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆663Jan 28, 2025Updated last year
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- A POC for Windows Extension Host hooking☆24Jul 13, 2019Updated 6 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- The research UEFI hypervisor that supports booting an operating system.☆718Aug 15, 2024Updated last year
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,038Apr 21, 2022Updated 3 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 7 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆227Jun 9, 2020Updated 5 years ago
- Rust unsafe bindings for Vid API (Hyper-V)☆23Feb 23, 2025Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- System call hook for Windows 10 20H1☆496Jun 26, 2021Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,285Feb 14, 2026Updated last month
- ☆99Oct 6, 2017Updated 8 years ago
- An example of a client and server using Windows' ALPC functions to send and receive data.☆117Jan 21, 2025Updated last year
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago