A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)
☆44Sep 1, 2018Updated 7 years ago
Alternatives and similar repositories for CapcomLib
Users that are interested in CapcomLib are comparing it to the libraries listed below
Sorting:
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- ☆28Nov 20, 2017Updated 8 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆20May 17, 2022Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- Global DLL injector☆71May 16, 2021Updated 4 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- ☆51Dec 19, 2023Updated 2 years ago
- VTIL command line utility☆27Feb 1, 2022Updated 4 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆17Mar 14, 2025Updated 11 months ago
- Intel Virtualization Technology demo☆73Oct 15, 2016Updated 9 years ago
- ☆25Mar 3, 2019Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- ☆15Sep 26, 2021Updated 4 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- ☆23May 8, 2023Updated 2 years ago
- Intel Vt-x/EPT based thin-hypervisor for windows with minimum possible code.☆183Oct 10, 2017Updated 8 years ago