LowLevelSys / physmem_remapper
☆21Updated this week
Related projects ⓘ
Alternatives and complementary repositories for physmem_remapper
- ☆70Updated 2 years ago
- ☆24Updated last month
- A simple ida python script to find .data ptr☆46Updated last year
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- page table manipulation to gain physical r/w☆38Updated 6 months ago
- nmi stackwalking + module verification☆85Updated 10 months ago
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆77Updated last year
- Library to manipulate drivers that expose a physical memory read/write primitive.☆21Updated last year
- 将驱动映射到会话 空间☆32Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆29Updated 7 months ago
- ☆48Updated 2 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆47Updated 2 years ago
- ☆48Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆16Updated last year
- A library to assist with memory & code protection.☆53Updated 8 months ago
- Hiding a system thread against conventional means of detection☆35Updated 4 years ago
- ☆36Updated 4 months ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆45Updated 8 months ago
- ntoskrnl .data hooks for UM-KM communication☆34Updated 5 months ago
- ☆32Updated 2 years ago
- Kernel Level NMI Callback Blocker☆29Updated 2 months ago
- just proof of concept. hooking MmCopyMemory PG safe.☆62Updated 11 months ago
- bypass to the p2c(s) that I have run over the past few months.☆52Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago