☆82Apr 23, 2024Updated last year
Alternatives and similar repositories for ModuleSpoof
Users that are interested in ModuleSpoof are comparing it to the libraries listed below
Sorting:
- ☆47Jul 7, 2024Updated last year
- ☆18Feb 5, 2025Updated last year
- ☆34Mar 3, 2024Updated last year
- ☆37Sep 26, 2024Updated last year
- ☆360May 11, 2025Updated 9 months ago
- Achieving code execution through abusing vectored exception handling☆17May 28, 2023Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆276Aug 25, 2023Updated 2 years ago
- ☆14Apr 15, 2024Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆153Jun 11, 2024Updated last year
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- page table manipulation to gain physical r/w☆43May 7, 2024Updated last year
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- nmi stackwalking + module verification☆162Dec 28, 2023Updated 2 years ago
- ☆37May 21, 2022Updated 3 years ago
- ☆84Apr 1, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- manual map unsigned driver over signed memory☆219Apr 11, 2024Updated last year
- partially disable patchguard up to win11 21H2☆19Jun 3, 2024Updated last year
- base for testing☆186Sep 28, 2024Updated last year
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago
- communicate with kernel using a image on disk☆16May 1, 2024Updated last year
- ☆53Oct 16, 2021Updated 4 years ago
- Kernel driver that moves the mouse☆76Mar 15, 2025Updated 11 months ago
- Disks for DMA☆141Apr 28, 2021Updated 4 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- ☆23May 8, 2023Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆82Nov 13, 2023Updated 2 years ago
- patch eft functions to allow for offline matches without battleye running☆60Mar 18, 2023Updated 2 years ago
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- BattlEye shellcodes tester☆151Jan 3, 2022Updated 4 years ago