ClaudeoPK / kbd_hookka
hook KeyboardClassServiceCallback to prevent messing up sistema
☆20Updated last year
Related projects ⓘ
Alternatives and complementary repositories for kbd_hookka
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- POC kernel driver with hidden system thread☆12Updated 6 months ago
- Bypass using kernel driver (not finish).☆19Updated last year
- clearing traces of a loaded driver☆44Updated 2 years ago
- Hiding a system thread against conventional means of detection☆35Updated 4 years ago
- mouseclassservicecallback detection via hook☆48Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆30Updated 7 months ago
- ☆49Updated 2 years ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 5 years ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- ☆32Updated last year
- Written in a couple hours, don't judge :)☆10Updated last year
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆16Updated last year
- Bypasses for Windows kernel callbacks PatchGuard protection☆42Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- ☆50Updated 11 months ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Updated last year
- ☆24Updated last year
- ☆44Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Bypassing kernel patch protection runtime☆19Updated last year
- fecurity executor from factory☆33Updated 2 years ago
- Simple memory obfuscator.☆24Updated 2 years ago