LabGuy94 / CopyMyWriteLinks
Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty
☆82Updated 3 weeks ago
Alternatives and similar repositories for CopyMyWrite
Users that are interested in CopyMyWrite are comparing it to the libraries listed below
Sorting:
- Translate virtual addresses to physical addresses from usermode.☆98Updated last year
- "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-o…☆36Updated last week
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- Kernel Level NMI Callback Blocker☆154Updated 4 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- nmi stackwalking + module verification☆155Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆223Updated last year
- Usermode exploit to bypass any AC using a 0day shatter attack.☆247Updated 2 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- ☆37Updated last year
- ☆83Updated last year
- UEFI Bootkit Framework that attacks boot-time Code Integrity☆108Updated last month
- manual map unsigned driver over signed memory☆214Updated last year
- A method to Disable DSE using .data ptr hooks☆38Updated last year
- ☆46Updated 11 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆132Updated 2 years ago
- PoC kernel to usermode injection☆103Updated last year
- Spoof the return address of any function call.☆11Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆92Updated 4 months ago
- spoof return address☆79Updated 2 years ago
- Hijacking Hyper-V at Runtime with DDMA☆76Updated 5 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆286Updated 2 months ago
- A modern C++20 header-only library for advanced direct system call invocation.☆165Updated last week
- POC Hook of nt!HvcallCodeVa☆54Updated 2 years ago
- using wnbios64.sys for arbitrary r/w☆15Updated 3 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆239Updated 2 months ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆81Updated 4 months ago