Oliver-1-1 / TOPMOST-DetectionLinks
☆20Updated 10 months ago
Alternatives and similar repositories for TOPMOST-Detection
Users that are interested in TOPMOST-Detection are comparing it to the libraries listed below
Sorting:
- ☆14Updated 2 years ago
- Header only UM AC "bypass"☆19Updated last year
- communicate with kernel using a image on disk☆15Updated last year
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 4 years ago
- Old way for blocking NMI interrupts☆27Updated 3 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆34Updated 2 years ago
- ☆45Updated last year
- Disable NMI Callbacks with Kernelmode Driver☆18Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated last year
- ☆26Updated 2 years ago
- POC kernel driver with hidden system thread☆13Updated last year
- Visual Studio template for GNU-EFI☆16Updated 3 years ago
- ☆16Updated 5 years ago
- ☆33Updated 2 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆21Updated last year
- Single header code that sets any section's page to No Access☆11Updated 3 years ago
- ☆13Updated 2 years ago
- ☆10Updated last year
- An advanced kernel anti cheat I made with some friends☆35Updated last year
- ☆34Updated last year
- it's a driver injector or driver loader header lib(Windows)☆11Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆18Updated 2 years ago
- RWX Section Abusing☆16Updated 2 years ago
- mouseclassservicecallback detection via hook☆52Updated 3 years ago
- modern c++ wrapper around the microsoft portable executable file format☆32Updated 3 weeks ago
- Stealing signatures from pe files☆14Updated 8 months ago
- ☆17Updated last year
- ☆36Updated last year