SamLarenN / SpeedFan-Exploit
Abusing SpeedFan driver ability of physical memory manipulation
☆108Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for SpeedFan-Exploit
- Intercepting DeviceControl via WPP☆127Updated 4 years ago
- ayy debuger☆88Updated 8 months ago
- BattlEye x64 usermode injector☆62Updated 5 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆160Updated 4 years ago
- Disable Driver Callbacks☆98Updated 7 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆65Updated 5 years ago
- ☆68Updated 4 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆125Updated 7 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Just my first IOCTL try☆70Updated 4 years ago
- ☆152Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆244Updated 4 years ago
- ☆64Updated 5 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- usermode standalone kernel interface☆110Updated 6 years ago
- a minimalistic windows hypervisor for amd processors☆98Updated 2 years ago
- ☆40Updated 5 years ago
- Simple mmapper which using UEFI runtime driver.☆78Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆79Updated 5 years ago
- A library to read physical memory and system-wide virtual memory.☆122Updated 6 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆83Updated 5 years ago
- A hypervisor hiding user-mode memory using EPT☆105Updated 6 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆122Updated 2 years ago
- A mini anti-anti debug hooking library for Windows.☆103Updated 3 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆96Updated 4 years ago
- driver mapper / capcom wrapper☆214Updated 5 years ago