Dark7oveRR / kdmapper
KDMAPPER build [1809,1903,1909,2004]
☆71Updated 4 years ago
Alternatives and similar repositories for kdmapper:
Users that are interested in kdmapper are comparing it to the libraries listed below
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆82Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- ☆90Updated last year
- ☆71Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- x64 manual mapper using inline syscalls☆8Updated 3 years ago
- ☆143Updated 4 years ago
- ayy debuger☆89Updated last year
- Kernel-based memory hacking framework communicating with a kernel driver via sockets.☆92Updated 3 years ago
- Windows Kernel Driver dlls injector using APC☆61Updated 6 years ago
- ☆139Updated last year
- Just my first IOCTL try☆72Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- ☆68Updated 3 years ago
- APEX-EACBypass(usermode)☆46Updated 6 years ago
- ☆152Updated 10 months ago
- ☆162Updated 3 years ago
- BattlEye kernel module bypass☆166Updated 2 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆108Updated 3 years ago
- Communication via callback☆73Updated 5 years ago
- manually map driver for a signed driver memory space☆151Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- Hide external overlay by using SetWindowDisplayAffinity☆94Updated 3 years ago
- ☆66Updated 2 years ago
- ☆78Updated 3 years ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆79Updated 4 years ago
- Intercepting DeviceControl via WPP☆131Updated 5 years ago