Apxaey / Unlinking-Modules-From-The-PEB-Dll-Hiding-
I did a full in depth video explaining this here: https://www.youtube.com/watch?v=u2jFhdrHVg0&t=294s
☆9Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Unlinking-Modules-From-The-PEB-Dll-Hiding-
- working injector bp (BE EAC & VANGUARD)☆4Updated 3 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆15Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆12Updated last year
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- Injector with kernel power☆16Updated 3 years ago
- x64 Windows privilege elevation using anycall☆20Updated 3 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 2 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- ☆17Updated 4 years ago
- Register a callback from a Manually mapped kernel module☆12Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- R3劫持所有异常☆13Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- Dump mapped PE files from memory to the disk☆17Updated 5 years ago
- manual mapping injector☆26Updated 2 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆12Updated 4 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- Simple driver loader for windows☆18Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆15Updated 5 months ago
- RET / JMP RBX call spoofer☆9Updated 5 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Updated last year
- ☆13Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆18Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆14Updated 2 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Updated 4 years ago
- Small class to help perform syscalls.☆21Updated last year
- ☆32Updated last year
- Bypassing kernel patch protection runtime☆19Updated last year