☆52Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for DisplayMiniportHooking
Users that are interested in DisplayMiniportHooking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Dec 22, 2020Updated 5 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 4 years ago
- xfsredir file system☆50Dec 6, 2020Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆56Mar 30, 2019Updated 7 years ago
- ☆15Mar 13, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- Sample project for kernel debugging automation with Vagrant☆60Apr 11, 2020Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- A tool to dump informations about the caller of a function.☆14Oct 4, 2016Updated 9 years ago
- Hooking kernel functions by abusing alignment☆250Jan 5, 2021Updated 5 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 9 months ago
- BEClient2.dll Dumper☆22Jul 9, 2020Updated 5 years ago
- C++ Exceptions in Windows Drivers☆220Dec 21, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Simple Example☆24Nov 30, 2018Updated 7 years ago
- PoC for a Vulnerability in OpenHardwareMonitor Driver that lets the user read and write in msrs☆22Sep 20, 2020Updated 5 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- A Windows kernel driver simulating hardware HID mouse and accompanying client application☆48Mar 16, 2022Updated 4 years ago
- A collection of Anti-RE & Anti-Dump methods☆29Jan 5, 2021Updated 5 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆352Sep 13, 2020Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆66Aug 31, 2023Updated 2 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The research UEFI hypervisor that supports booting an operating system.☆733Aug 15, 2024Updated last year
- collection of code snippets,windbg,python scripts and resources☆13Jul 11, 2022Updated 3 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- This tool Decrypt and Extract the files from the EAC☆89Feb 17, 2026Updated 2 months ago
- C++ graphics kernel subsystem hook☆565Jan 11, 2021Updated 5 years ago
- ☆36Jun 13, 2020Updated 5 years ago
- Enumerate user mode shared memory mappings on Windows.☆135Feb 14, 2021Updated 5 years ago
- paste string formatted byte data block into x64dbg easy.☆42Jan 2, 2021Updated 5 years ago
- Intercepting DeviceControl via WPP☆137Nov 18, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆111Nov 13, 2023Updated 2 years ago
- Discarded Section Manual Map☆67Jun 18, 2020Updated 5 years ago
- fix wow obfucated IAT☆10Aug 4, 2021Updated 4 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆111Dec 24, 2020Updated 5 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago