SamLarenN / SpeedFan-Exploit
Abusing SpeedFan driver ability of physical memory manipulation
☆108Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SpeedFan-Exploit
- BattlEye x64 usermode injector☆62Updated 5 years ago
- Intercepting DeviceControl via WPP☆128Updated 5 years ago
- Disable Driver Callbacks☆98Updated 7 years ago
- ayy debuger☆88Updated 8 months ago
- Just my first IOCTL try☆70Updated 4 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- ☆152Updated 5 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆65Updated 5 years ago
- ☆40Updated 5 years ago
- disable most common windowsx64 systems patchguard☆83Updated 5 years ago
- ☆68Updated 4 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- Communication via callback☆70Updated 5 years ago
- ☆93Updated 7 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆121Updated 2 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆125Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆74Updated 6 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆84Updated 5 years ago
- Windows Driver Kit Extesion Header (Undoc)☆132Updated 3 years ago
- A library to read physical memory and system-wide virtual memory.☆122Updated 6 years ago
- ☆83Updated last year
- ☆64Updated 5 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆110Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 5 years ago