Just an example of a well-known technique to detect memory tampering via Windows Working Sets.
☆18Jan 15, 2022Updated 4 years ago
Alternatives and similar repositories for QueryWorkingSetExample
Users that are interested in QueryWorkingSetExample are comparing it to the libraries listed below
Sorting:
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- GDI Render in kernelmode☆10Mar 7, 2020Updated 5 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- Compile-Time Calls Obfuscator for C++14+☆52Dec 7, 2023Updated 2 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆59Feb 9, 2025Updated last year
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆87May 17, 2023Updated 2 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Oct 15, 2014Updated 11 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- 保护进程☆24Apr 4, 2023Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆60Jan 31, 2024Updated 2 years ago
- A debugger library using VEH.☆68Sep 3, 2024Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- ☆63Sep 28, 2022Updated 3 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆34Jul 19, 2021Updated 4 years ago
- 这是一个 fps 单机游戏逆向练习项目,使用 imgui 绘制。(This is a reverse practice project for fps single player games, drawn using imgui.)☆13Sep 5, 2023Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Mar 18, 2019Updated 6 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- 🪝 Various EPT hook detection approaches☆143Updated this week
- ☆37Sep 26, 2024Updated last year
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- A document tagging library☆33Mar 27, 2025Updated 11 months ago
- ☆34Aug 14, 2023Updated 2 years ago