Ahora57 / Unabomber
Improved VMP Idea(detect anti-anti-debug tools by bug)
☆40Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Unabomber
- Kernel ReClassEx☆63Updated last year
- PAGE_GUARD based hooking library☆40Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆39Updated 5 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆52Updated 9 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆30Updated 8 months ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆63Updated last year
- Library to manipulate drivers that expose a physical memory read/write primitive.☆21Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆46Updated last year
- Binary rewriter for 64-bit PE files.☆43Updated 9 months ago
- Windows PDB parser for kernel-mode environment.☆90Updated last year
- clearing traces of a loaded driver☆44Updated 2 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆34Updated 5 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆41Updated last year
- ☆44Updated 2 years ago
- PoC kernel to usermode injection☆60Updated 8 months ago
- ☆49Updated 2 years ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆31Updated 2 months ago
- mouseclassservicecallback detection via hook☆48Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆20Updated 3 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆24Updated last month
- A lightweight BattlEye emulator of the launcher☆57Updated 2 years ago
- A devirtualization engine for Themida.☆91Updated 8 months ago