Experiment with PAGE_GUARD protection to hide memory from other processes
☆54Jun 24, 2024Updated last year
Alternatives and similar repositories for MemoryGuard
Users that are interested in MemoryGuard are comparing it to the libraries listed below
Sorting:
- communicate with kernel using a image on disk☆16May 1, 2024Updated last year
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆225Jul 17, 2024Updated last year
- page table manipulation to gain physical r/w☆43May 7, 2024Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆82Nov 13, 2023Updated 2 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆43Apr 23, 2021Updated 4 years ago
- Hijack Bandicam's in-game overlay for rendering onto the screen with DirectX11.☆35Jul 29, 2024Updated last year
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- ☆47Jul 7, 2024Updated last year
- simple zero-dependency timer implementation☆12May 24, 2023Updated 2 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- IoCreateDriver Implementation, it can be useful if you're trying to bypass anticheats☆122Dec 4, 2025Updated 2 months ago
- anti crack system protector☆108Nov 27, 2023Updated 2 years ago
- Anti-Cheat Artifacts detector for IDA☆91Jan 2, 2026Updated last month
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆372Feb 26, 2025Updated last year
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- Win32 PE (dll, sys, exe) remote manual mapper written on PHP with injector-client written on C++20☆73Feb 28, 2023Updated 2 years ago
- ☆18Jan 11, 2026Updated last month
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads☆237Dec 16, 2023Updated 2 years ago
- Using CVE-2023-21768 to manual map kernel mode driver☆197Mar 10, 2023Updated 2 years ago
- ☆82Apr 23, 2024Updated last year
- State of the art DLL injector that took 20 minutes to make☆226Aug 16, 2023Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆227Jan 24, 2025Updated last year
- A simple present scene, kernel allocation injector.☆27Jun 12, 2022Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- C++ Assembler with Built-in Mutation Engine☆30Sep 6, 2025Updated 5 months ago
- Detour library (x64 and x86 compatible)☆13Dec 15, 2020Updated 5 years ago
- windows kernel pagehook☆41Oct 30, 2022Updated 3 years ago
- manual map unsigned driver over signed memory☆219Apr 11, 2024Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- ☆13Aug 24, 2022Updated 3 years ago
- Using ioctl major function swaps to "spoof" the ARP table☆15Sep 11, 2024Updated last year
- POC kernel driver with hidden system thread☆13May 14, 2024Updated last year
- Simple proof of concept showing how you can use Discord's in-game internal module to draw on top of the game (even if the game is in full…☆209Aug 24, 2023Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆68Feb 7, 2024Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆386Jul 6, 2022Updated 3 years ago