SamLarenN / CPUZ-DSEFix
Exploiting CPU-Z Driver To Turn Load Unsigned Drivers
☆125Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for CPUZ-DSEFix
- A hypervisor hiding user-mode memory using EPT☆105Updated 6 years ago
- ayy debuger☆88Updated 8 months ago
- Hide Driver By MiProcessLoaderEntry☆281Updated 5 years ago
- disable most common windowsx64 systems patchguard☆83Updated 5 years ago
- Windows Driver Kit Extesion Header (Undoc)☆132Updated 3 years ago
- Hide codes/data in the kernel address space.☆185Updated 3 years ago
- Windows kernel mode driver to prevent detection of debuggers.☆95Updated 9 years ago
- ☆121Updated 4 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆74Updated 6 years ago
- pseudo-code to show how to disable patchguard with win10☆295Updated 6 years ago
- driver mapper / capcom wrapper☆215Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆108Updated 6 years ago
- BattlEye x64 usermode injector☆62Updated 5 years ago
- hook msr by amd svm☆119Updated 4 years ago
- ☆153Updated 5 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆110Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆110Updated 7 years ago
- Windows Kernel Template Library☆108Updated 2 years ago
- Disable Driver Callbacks☆98Updated 7 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆175Updated 8 years ago
- Collect different versions of Crucial modules.☆127Updated 4 months ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆160Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- PatchGuard Research☆292Updated 6 years ago
- StrongOD(anti anti-debug plugin) driver source code.☆113Updated 7 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆142Updated 5 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆218Updated 6 years ago