NewWorldComingSoon / llvm-msvc
This project migrated to https://github.com/backengineering/llvm-msvc
☆82Updated last year
Related projects ⓘ
Alternatives and complementary repositories for llvm-msvc
- Windows PDB parser for kernel-mode environment.☆90Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆171Updated last year
- nmi stackwalking + module verification☆91Updated 10 months ago
- Standard Kernel Library for Windows hacking in C++☆91Updated 3 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆140Updated last year
- ☆118Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆67Updated 5 years ago
- ☆125Updated last year
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆73Updated last year
- ☆70Updated 2 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆117Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆78Updated 2 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆67Updated 2 years ago
- InfinityHookProMax: Make InfinityHook great great again☆42Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆65Updated 3 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆142Updated 2 months ago
- load unsigned kernel-driver by patching dse in 248 lines☆110Updated 8 months ago
- Kernel ReClassEx☆63Updated last year
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆67Updated 3 weeks ago
- Reverse engineering winapi function loadlibrary.☆70Updated last year
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆62Updated 3 weeks ago
- A simple ida python script to find .data ptr☆47Updated last year
- 从MmPfnData中枚举进程和页目录基址☆139Updated last year
- DSE & PG bypass via BYOVD attack☆37Updated 7 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆80Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆81Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆41Updated last year
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆104Updated 3 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆64Updated 2 years ago