Peribunt / CTCLinks
Interprocess communication via a covert timing channel
☆22Updated last week
Alternatives and similar repositories for CTC
Users that are interested in CTC are comparing it to the libraries listed below
Sorting:
- POC Hook of nt!HvcallCodeVa☆53Updated 2 years ago
- ☆32Updated last year
- ☆34Updated 2 years ago
- ☆16Updated 4 years ago
- A minimalistic way to spoof return addresses without using exceptions☆17Updated 3 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆25Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆59Updated last year
- A Simple Example☆23Updated 6 years ago
- hooks gServerHandlers xxxEventWndProc☆13Updated 3 years ago
- detect hypervisor with Nmi Callback☆40Updated 3 years ago
- partially disable patchguard up to win11 21H2☆18Updated last year
- Achieving code execution through abusing vectored exception handling☆17Updated 2 years ago
- ☆26Updated 11 months ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- ☆23Updated 2 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆47Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- A poc that abuses Enclave☆40Updated 3 years ago
- ☆21Updated 4 years ago
- An example code of CiGetCertPublisherName☆17Updated 3 years ago
- Disk based DMA for ATA and SCSI☆33Updated 2 years ago
- POC kernel driver with hidden system thread☆13Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 3 years ago
- A simple present scene, kernel allocation injector.☆26Updated 3 years ago
- ☆72Updated 3 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- Windows PDB parser for kernel-mode environment.☆102Updated 4 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated last year
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆21Updated last year
- Runtime Hyper-V Hijacking with DDMA☆64Updated 2 months ago