Dracopa / Kernelmode-driverLinks
Simple IOCTL hooking driver for Kernel- User - Mode communication.
☆12Updated 5 years ago
Alternatives and similar repositories for Kernelmode-driver
Users that are interested in Kernelmode-driver are comparing it to the libraries listed below
Sorting:
- Mapping your code on a 0x1000 size page☆71Updated 3 years ago
- ☆35Updated 5 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- ☆48Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 7 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆66Updated 2 years ago
- Detect removed thread from PspCidTable.☆75Updated 3 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Communication via callback☆73Updated 6 years ago
- HWID Spoofer which spoofs disk serials, smart disk serials and SMBIOS.☆42Updated 5 years ago
- ☆51Updated last year
- ☆48Updated 3 years ago
- Discarded Section Manual Map☆68Updated 5 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆32Updated 6 years ago
- ☆68Updated 4 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆106Updated 2 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- ☆82Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago
- ☆14Updated 4 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- ☆18Updated 5 years ago
- page table manipulation to gain physical r/w☆42Updated last year