IamM47Z / OpenHardwareMonitor-PoCLinks
PoC for a Vulnerability in OpenHardwareMonitor Driver that lets the user read and write in msrs
☆22Updated 5 years ago
Alternatives and similar repositories for OpenHardwareMonitor-PoC
Users that are interested in OpenHardwareMonitor-PoC are comparing it to the libraries listed below
Sorting:
- ☆34Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- Communication via callback☆74Updated 6 years ago
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 5 years ago
- ☆51Updated last year
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- Ironsight Internal Multihack☆41Updated 2 years ago
- PareidoliaTriggerbot is a hypervisor-based, external Widowmaker triggerbot which uses the VivienneVMM and MouClassInputInjection projects…☆32Updated 5 years ago
- ☆42Updated 3 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆72Updated 4 years ago
- ☆106Updated last year
- ☆68Updated 4 years ago
- ☆51Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Updated 2 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 5 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Updated 4 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆81Updated 4 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆82Updated 4 years ago
- ☆50Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- ☆28Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago