IntelSDM / PEFromMemoryLinks
Executing EXE Files From Memory
☆10Updated last year
Alternatives and similar repositories for PEFromMemory
Users that are interested in PEFromMemory are comparing it to the libraries listed below
Sorting:
- ☆17Updated 4 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- communicate with kernel using a image on disk☆16Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆33Updated last year
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆19Updated 2 years ago
- ☆56Updated 2 years ago
- ☆41Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆9Updated 3 years ago
- Register a callback from a Manually mapped kernel module☆16Updated 3 years ago
- ☆53Updated 2 years ago
- Bypass using kernel driver (not finish).☆21Updated 2 years ago
- ☆25Updated last year
- PAGE_GUARD based hooking library☆47Updated 3 years ago
- ☆32Updated 3 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆23Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 3 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- An other Detected & Pasted driver☆25Updated 3 years ago
- ☆16Updated 3 years ago
- Hiding a system thread against conventional means of detection☆41Updated 4 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Updated 4 years ago
- ☆13Updated last year
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆23Updated 4 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆42Updated 9 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆97Updated 2 years ago
- Kernel Injector pasted from various different Github repositories.☆17Updated 5 years ago