SamuelTulach / tpm-spooferView external linksLinks
Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads
☆235Dec 16, 2023Updated 2 years ago
Alternatives and similar repositories for tpm-spoofer
Users that are interested in tpm-spoofer are comparing it to the libraries listed below
Sorting:
- base for testing☆186Sep 28, 2024Updated last year
- ☆355May 11, 2025Updated 9 months ago
- kernel mode anti cheat☆628Aug 4, 2024Updated last year
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆364Feb 26, 2025Updated 11 months ago
- scan system / process integrity☆350Oct 22, 2024Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆192Jul 11, 2023Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆225Jan 24, 2025Updated last year
- xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, all…☆291Jan 18, 2024Updated 2 years ago
- ☆29Mar 9, 2024Updated last year
- kernel anticheat to test your driver against☆181Jun 16, 2025Updated 7 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆220Jul 17, 2024Updated last year
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆313May 31, 2023Updated 2 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆277Aug 25, 2023Updated 2 years ago
- Kernel-mode Windows HWID spoofer☆605Jan 22, 2024Updated 2 years ago
- A mapper that maps shellcode into loaded large page drivers☆321Apr 26, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- Lightweight Intel VT-x Hypervisor.☆660Dec 17, 2024Updated last year
- ☆102Mar 26, 2022Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- PoC HWID spoofer that runs in EFI☆340Dec 26, 2024Updated last year
- Kernel ReClassEx☆66Nov 21, 2023Updated 2 years ago
- ☆39Mar 23, 2023Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆82Nov 13, 2023Updated 2 years ago
- Bypassing PatchGuard on modern x64 systems☆265Apr 9, 2023Updated 2 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆22Feb 9, 2024Updated 2 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆162Sep 22, 2023Updated 2 years ago
- Hide SMBIOS/disk/NIC serials from EFI bootkit☆323May 14, 2021Updated 4 years ago
- Single-header, minimalistic, cross-platform hook library written in pure C☆374Jan 3, 2026Updated last month
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 10 months ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆215Oct 1, 2021Updated 4 years ago
- External Base for bypassing Shadow Regions in Valorant☆303Nov 5, 2024Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Jun 24, 2024Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Sep 22, 2024Updated last year
- ☆34Mar 3, 2024Updated last year
- Kernel Level NMI Callback Blocker☆157Sep 27, 2025Updated 4 months ago