KiFilterFiberContext / BadlionLogger
kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT
☆33Updated 3 years ago
Alternatives and similar repositories for BadlionLogger:
Users that are interested in BadlionLogger are comparing it to the libraries listed below
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- Code virtualizer☆23Updated 8 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆40Updated 3 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- ☆30Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆33Updated last year
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆25Updated last year
- A simple way to spoof return addresses using an exception handler☆31Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- PAGE_GUARD based hooking library☆43Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 8 months ago
- Me fockin' pe protector☆45Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- Windows kernel driver template for cmkr (with testsigning).☆30Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 9 months ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆42Updated last year
- POC Hook of nt!HvcallCodeVa☆51Updated last year
- Discarded Section Manual Map☆67Updated 4 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆44Updated 6 months ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- ☆46Updated 3 years ago
- ☆38Updated 2 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- Bypass valorant page guard external☆22Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year