☆83Apr 23, 2024Updated last year
Alternatives and similar repositories for ModuleSpoof
Users that are interested in ModuleSpoof are comparing it to the libraries listed below
Sorting:
- ☆19Feb 5, 2025Updated last year
- ☆48Jul 7, 2024Updated last year
- ☆34Mar 3, 2024Updated 2 years ago
- ☆37Sep 26, 2024Updated last year
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- ☆367May 11, 2025Updated 10 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- ☆14Apr 15, 2024Updated last year
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆280Updated this week
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆153Jun 11, 2024Updated last year
- nmi stackwalking + module verification☆165Dec 28, 2023Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Jun 3, 2024Updated last year
- ☆37May 21, 2022Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- ☆84Apr 1, 2022Updated 3 years ago
- ☆19Apr 14, 2023Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- ☆23May 8, 2023Updated 2 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- base for testing☆187Sep 28, 2024Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated this week
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Updated this week
- page table manipulation to gain physical r/w☆44May 7, 2024Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆30May 7, 2024Updated last year
- ☆53Oct 16, 2021Updated 4 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- Disks for DMA☆145Apr 28, 2021Updated 4 years ago
- manual map unsigned driver over signed memory☆222Apr 11, 2024Updated last year
- Code for Battleyes shellcode☆237Nov 11, 2021Updated 4 years ago
- Standard Kernel Library for Windows manipulation in C++☆203Jun 18, 2025Updated 9 months ago
- Written in a couple hours, don't judge :)☆17Jun 3, 2023Updated 2 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆36Oct 26, 2020Updated 5 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆475Jan 3, 2022Updated 4 years ago