SamLarenN / SpeedFan-Exploit
Abusing SpeedFan driver ability of physical memory manipulation
☆107Updated 6 years ago
Alternatives and similar repositories for SpeedFan-Exploit:
Users that are interested in SpeedFan-Exploit are comparing it to the libraries listed below
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- ayy debuger☆88Updated 10 months ago
- BattlEye x64 usermode injector☆64Updated 5 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆65Updated 5 years ago
- Disable Driver Callbacks☆99Updated 7 years ago
- Capcom wrapper with safety in mind.☆80Updated 6 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- ☆155Updated 5 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆163Updated 4 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆125Updated 7 years ago
- Hide codes/data in the kernel address space.☆187Updated 3 years ago
- ☆93Updated 7 years ago
- Hooking kernel functions by abusing alignment☆240Updated 4 years ago
- Just my first IOCTL try☆72Updated 4 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- Hooking SSDT with Avast Internet Security Hypervisor☆112Updated 5 years ago
- ☆69Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆80Updated 5 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆99Updated 4 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆75Updated 6 years ago
- A library to read physical memory and system-wide virtual memory.☆126Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆272Updated 4 years ago
- driver mapper / capcom wrapper☆217Updated 5 years ago
- ☆184Updated 5 years ago
- x64 syscall caller in C++.☆85Updated 6 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆121Updated 2 years ago
- ☆64Updated 5 years ago