Just an example of a well-known technique to detect memory tampering via Windows Working Sets.
☆18Jan 15, 2022Updated 4 years ago
Alternatives and similar repositories for QueryWorkingSetExample
Users that are interested in QueryWorkingSetExample are comparing it to the libraries listed below
Sorting:
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 3 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆15Sep 21, 2019Updated 6 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆89May 17, 2023Updated 2 years ago
- GDI Render in kernelmode☆10Mar 7, 2020Updated 6 years ago
- silence file system monitoring components by hooking their minifilters☆61Jan 31, 2024Updated 2 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- ☆17Dec 18, 2022Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- A debugger library using VEH.☆69Sep 3, 2024Updated last year
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆57May 23, 2022Updated 3 years ago
- ☆25May 20, 2018Updated 7 years ago
- A poc that abuses Enclave☆40Sep 8, 2022Updated 3 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆13Jun 10, 2018Updated 7 years ago
- Compile-Time Calls Obfuscator for C++14+☆52Dec 7, 2023Updated 2 years ago
- LoadLibrary, GetModuleHandle and GetProcAddress calls for remote processes☆22Oct 15, 2014Updated 11 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- C++ python bytecode disassembler and decompiler☆15Dec 11, 2022Updated 3 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆59Feb 9, 2025Updated last year
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆125Jul 12, 2024Updated last year
- 🪝 Various EPT hook detection approaches☆143Feb 22, 2026Updated 3 weeks ago
- x86 bootloader emulation with Miasm (case of NotPetya)☆43May 26, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/virtdbg☆99Jun 25, 2015Updated 10 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- ☆40May 29, 2022Updated 3 years ago
- Its a header-only runtime tool for importing functions from modules.☆45Mar 20, 2023Updated 3 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆130Sep 27, 2023Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆32Jul 2, 2024Updated last year
- ☆49Feb 21, 2022Updated 4 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆278Aug 25, 2023Updated 2 years ago