πΊπ¦ Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc
β2,005Jul 13, 2022Updated 3 years ago
Alternatives and similar repositories for hidden
Users that are interested in hidden are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hiding kernel-driver for x86/x64.β2,635Sep 2, 2025Updated 6 months ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Managerβ696Mar 26, 2019Updated 6 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APCβ1,274May 1, 2024Updated last year
- Turn off PatchGuard in real time for win7 (7600) ~ laterβ1,038Apr 21, 2022Updated 3 years ago
- Kernel Driver Utilityβ2,453Feb 17, 2026Updated last month
- Windows kernel hacking framework, driver template, hypervisor and API written on C++β1,802Nov 12, 2023Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisorβ1,285Feb 14, 2026Updated last month
- Windows memory hacking libraryβ5,361Jan 26, 2024Updated 2 years ago
- Hook system calls, context switches, page faults and more.β2,639May 9, 2023Updated 2 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPTβ1,362Jan 22, 2022Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.β905Nov 21, 2019Updated 6 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hookβ566Jan 4, 2025Updated last year
- A free but powerful Windows kernel research tool.β2,661Dec 14, 2025Updated 3 months ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcementβ1,201Aug 1, 2019Updated 6 years ago
- Disable PatchGuard and Driver Signature Enforcement at boot timeβ2,329Aug 3, 2025Updated 7 months ago
- Protected Processes Light Killerβ981Mar 24, 2023Updated 2 years ago
- Windows NT Syscall tablesβ1,396Updated this week
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemoβ¦β634Mar 19, 2019Updated 7 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.β6,885Mar 1, 2026Updated 3 weeks ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly wayβ1,903Aug 3, 2023Updated 2 years ago
- Windows Object Explorer 64-bitβ1,893Mar 9, 2026Updated 2 weeks ago
- δΉει£δ»½ζ―7600ηοΌζ―欑ηΌθ―ζεΎε₯½ιΊ»η¦γζ΄ζ°δΈδΈͺVS2017ε―δ»₯η΄ζ₯ηΌθ―ηγβ154Jun 5, 2019Updated 6 years ago
- Manual mapping without creating any threads, with rw only accessβ808Oct 29, 2019Updated 6 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.β1,736Nov 24, 2023Updated 2 years ago
- Minimalistic VT-x hypervisor with hooksβ935Oct 18, 2019Updated 6 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSKβ541Sep 2, 2022Updated 3 years ago
- Using Driver Global Injection dll, it can hide DLL modulesβ537Jun 28, 2019Updated 6 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+β748Jun 26, 2017Updated 8 years ago
- Converts PE into a shellcodeβ2,752Aug 30, 2025Updated 6 months ago
- System call hook for Windows 10 20H1β496Jun 26, 2021Updated 4 years ago
- Windows NT x64 syscall fuzzerβ634Feb 19, 2026Updated last month
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.β2,109Feb 19, 2026Updated last month
- The functions interception library written on pure C and NativeAPI with UserMode and KernelMode supportβ763Apr 24, 2025Updated 10 months ago
- Hypervisor based anti anti debug plugin for x64dbgβ1,570Jul 8, 2024Updated last year
- Simple x86-64 VT-x Hypervisor with EPT Hookingβ953Apr 24, 2023Updated 2 years ago
- KDMapper is a simple tool that exploits iqvw64e.sys Intel driver to manually map non-signed drivers in memoryβ2,807Updated this week
- Universal PatchGuard and Driver Signature Enforcement Disableβ862Mar 29, 2019Updated 6 years ago
- Inline syscalls made easy for windows on clangβ736Jun 21, 2024Updated last year
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.β2,279Feb 15, 2026Updated last month