9176324 / Win2K3
☆29Updated this week
Related projects: ⓘ
- c++ implementation of windows heavens gate☆54Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆35Updated 2 years ago
- ☆38Updated this week
- Example of hijacking system calls via function pointer tables☆30Updated 3 years ago
- map driver to memory☆25Updated 6 years ago
- ☆24Updated this week
- Windows Console Monitor☆32Updated 5 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Call 32bit NtDLL API directly from WoW64 Layer☆59Updated 3 years ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- Load Dll into Kernel space☆39Updated 2 years ago
- Static Library For Windows Drivers☆29Updated 3 weeks ago
- For Example. See Miro's Blog☆29Updated last year
- Wow64 Heaven's Gate Hook☆25Updated 3 years ago
- A collection of Windows Components(Mostly is ntoskrnl.exe)☆26Updated 3 years ago
- ollvm 4.0 using clang 10.0.1☆12Updated 3 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆33Updated 5 years ago
- Analysing and defeating PatchGuard universally☆34Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆37Updated 6 years ago
- Library for using direct system calls☆35Updated 4 years ago
- Protected Process Light Library☆18Updated 4 years ago
- direct systemcalls with a modern c++20 interface.☆41Updated last year
- ☆28Updated 3 years ago
- ☆29Updated this week
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆49Updated 3 years ago
- ☆17Updated this week
- intel vt-x hypervisor ept☆26Updated 4 years ago
- ☆16Updated this week
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 2 years ago