IcEy-999 / Kernel-Special-APC-ReadProcessMemoryView external linksLinks
Example of reading process memory through kernel special APC
☆110Apr 21, 2023Updated 2 years ago
Alternatives and similar repositories for Kernel-Special-APC-ReadProcessMemory
Users that are interested in Kernel-Special-APC-ReadProcessMemory are comparing it to the libraries listed below
Sorting:
- ☆144Dec 10, 2022Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- ☆193May 1, 2023Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- ☆184May 20, 2022Updated 3 years ago
- a monitoring windows driver calls kernel api tools☆126Jul 5, 2024Updated last year
- 从MmPfnData中枚举进程和页目录基址☆206Aug 18, 2023Updated 2 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆469Jan 3, 2022Updated 4 years ago
- r/w virtual memory without attach☆216Oct 19, 2023Updated 2 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- ☆306May 11, 2023Updated 2 years ago
- anti cheat drv open source☆19Apr 18, 2024Updated last year
- ☆174Mar 9, 2022Updated 3 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆102Jun 26, 2023Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆105Apr 28, 2023Updated 2 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆159May 21, 2024Updated last year
- ☆73Aug 31, 2022Updated 3 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- a debugger use vt technology☆355Jun 30, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆119Feb 8, 2022Updated 4 years ago
- ☆39Mar 23, 2023Updated 2 years ago
- ☆23May 8, 2023Updated 2 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆46Jun 3, 2021Updated 4 years ago
- ☆45Sep 25, 2024Updated last year
- ☆17Apr 21, 2022Updated 3 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- 将shellcode注入dwm.exe以进行屏幕截取☆355Mar 22, 2022Updated 3 years ago
- Example driver on how to use SKLib☆67Nov 20, 2024Updated last year
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago