IamM47Z / OpenHardwareMonitor-PoCLinks
PoC for a Vulnerability in OpenHardwareMonitor Driver that lets the user read and write in msrs
☆22Updated 4 years ago
Alternatives and similar repositories for OpenHardwareMonitor-PoC
Users that are interested in OpenHardwareMonitor-PoC are comparing it to the libraries listed below
Sorting:
- A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- Ironsight Internal Multihack☆40Updated last year
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Communication via callback☆72Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ☆100Updated last year
- ☆36Updated 5 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆12Updated 5 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆47Updated 4 years ago
- ☆48Updated 4 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- ☆69Updated 3 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- Discarded Section Manual Map☆69Updated 5 years ago
- ☆50Updated last year
- ☆46Updated 3 years ago
- mouseclassservicecallback detection via hook☆51Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- ☆80Updated 3 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆48Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆118Updated 3 years ago
- Hiding a system thread against conventional means of detection☆41Updated 4 years ago
- ☆50Updated 5 years ago
- ☆42Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- ☆28Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆88Updated 5 years ago