GitMirar / DriverLoaderLinks
Small tool which loads Windows drivers with NtLoadDriver
☆44Updated 4 years ago
Alternatives and similar repositories for DriverLoader
Users that are interested in DriverLoader are comparing it to the libraries listed below
Sorting:
- Analyze PatchGuard☆57Updated 7 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 7 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- by others☆39Updated 7 years ago
- Modify process handle permissions☆61Updated 8 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 7 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 5 years ago
- Global DLL injector☆69Updated 4 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆67Updated 6 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆24Updated 9 months ago
- Manual PE image mapper☆65Updated 12 years ago
- ☆44Updated 7 years ago
- ☆24Updated 7 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Updated 6 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Updated 5 years ago
- Another method to anti ThreadHideFromDebugger☆37Updated 6 years ago
- A Windows game hacking framework☆40Updated 9 years ago
- ☆50Updated 6 years ago
- CatDriver - The Kernel Mode Driver that written in C++. It is an useful driver and has the highest privilege level on the Windows platfor…☆65Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆14Updated 6 years ago
- My take on the capcom driver vulnerability☆28Updated 8 years ago
- Use the Cheat Engine driver in your own process!☆24Updated 7 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆27Updated 7 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- Windows Console Monitor☆34Updated 6 years ago