Anal-Repair / gigabyte_gdrv3_exploitLinks
Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.
☆17Updated 2 years ago
Alternatives and similar repositories for gigabyte_gdrv3_exploit
Users that are interested in gigabyte_gdrv3_exploit are comparing it to the libraries listed below
Sorting:
- Hooking Heavens Gate in a weekend☆13Updated 3 years ago
- ☆59Updated 3 years ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- A minimalistic logger for Windows Kernel Drivers.☆25Updated last year
- ☆31Updated 3 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆77Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆35Updated 3 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated last year
- ☆11Updated 3 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆65Updated last month
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- ☆38Updated 2 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Signature finder (from PE-bear)☆38Updated 2 months ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- PDB Rewriting Rust Library☆25Updated last year
- ☆26Updated 3 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆59Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆23Updated last year
- ☆22Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆90Updated 6 months ago
- windows rootkit☆61Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆35Updated 3 years ago