Mhy Exp (exploit signed driver)
☆141May 17, 2022Updated 3 years ago
Alternatives and similar repositories for mhy_exp
Users that are interested in mhy_exp are comparing it to the libraries listed below
Sorting:
- Kill Protected Process Light Process (include av)☆57Sep 15, 2023Updated 2 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆86Sep 15, 2022Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆77May 17, 2022Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆182Aug 26, 2022Updated 3 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆54Jan 19, 2021Updated 5 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆72Apr 26, 2021Updated 4 years ago
- golang implementation of Syswhisper2/Syswhisper3☆23Mar 23, 2022Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- InfinityHookPro Win7 -> Win11 latest☆553Feb 7, 2023Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Top level overlay drawing for game cheating using dwm.exe☆48Oct 26, 2021Updated 4 years ago
- ☆125May 23, 2020Updated 5 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- Beacon.dll reverse☆141Sep 5, 2021Updated 4 years ago
- 过去写的一些Windows安全研究相关代码☆135Feb 2, 2019Updated 7 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- 关于intel和amd指令行为不一样这件事☆62Apr 15, 2022Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆271Aug 31, 2022Updated 3 years ago
- ☆163Oct 29, 2020Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- 远程创建任务计划工具☆190Apr 23, 2022Updated 3 years ago
- 无痕注入1☆77Jun 1, 2021Updated 4 years ago
- BattlEye kernel module bypass☆177Oct 1, 2022Updated 3 years ago
- ☆48Nov 7, 2018Updated 7 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆51Jun 7, 2022Updated 3 years ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Jan 16, 2025Updated last year
- Force a file delete using a windows kernel driver☆73Jul 29, 2022Updated 3 years ago
- System call hook for Windows 10 20H1☆496Jun 26, 2021Updated 4 years ago
- Analyze Windows x64 Kernel Memory Layout☆130Nov 19, 2020Updated 5 years ago
- VT Hook☆51Jul 2, 2024Updated last year
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- 隐藏可执行内存☆267Apr 27, 2025Updated 10 months ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- vmp2.x devirtualization☆90Nov 3, 2024Updated last year
- ☆61Aug 21, 2023Updated 2 years ago