Dracopa / Kernelmode-driverLinks
Simple IOCTL hooking driver for Kernel- User - Mode communication.
☆12Updated 5 years ago
Alternatives and similar repositories for Kernelmode-driver
Users that are interested in Kernelmode-driver are comparing it to the libraries listed below
Sorting:
- Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
- ☆49Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- Communication via callback☆74Updated 6 years ago
- ☆35Updated 5 years ago
- ☆82Updated 4 years ago
- Discarded Section Manual Map☆67Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Updated 3 years ago
- ☆106Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 4 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- ☆68Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- ☆72Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- page table manipulation to gain physical r/w☆42Updated last year
- ☆27Updated 2 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆90Updated 6 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Unsigned Kernel Mode Driver that does memory modifications☆11Updated 3 years ago
- ☆62Updated 3 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆67Updated 2 years ago
- battleye shellcode☆18Updated 5 years ago
- ☆17Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago