SamuelTulach / DirectPageManipulation
A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy
☆75Updated last year
Related projects: ⓘ
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆69Updated last year
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆47Updated 5 months ago
- ☆46Updated last year
- clearing traces of a loaded driver☆45Updated 2 years ago
- Mapping your code on a 0x1000 size page☆66Updated 2 years ago
- ☆63Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆78Updated 2 years ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆48Updated 2 years ago
- Standard Kernel Library for Windows hacking in C++☆57Updated last month
- nmi stackwalking + module verification☆78Updated 8 months ago
- ☆50Updated this week
- ☆53Updated this week
- ☆66Updated 2 years ago
- A library to assist with memory & code protection.☆53Updated 6 months ago
- page table manipulation to gain physical r/w☆38Updated 4 months ago
- ☆46Updated last year
- ☆63Updated 4 months ago
- Discarded Section Manual Map☆65Updated 4 years ago
- ☆40Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆31Updated 2 months ago
- ☆46Updated 2 years ago
- mouseclassservicecallback detection via hook☆46Updated 2 years ago
- ☆62Updated this week
- Kernel driver that uses Shared memory to communicate with UserMode☆81Updated 5 years ago
- POC usermode <=> kernel communication via ALPC.☆51Updated 3 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆29Updated 5 months ago
- ☆76Updated 3 years ago
- Windows Kernel Misc☆22Updated last year
- 将驱动映射到会话空间☆32Updated 2 years ago
- ☆33Updated 2 years ago