☆58Mar 14, 2023Updated 2 years ago
Alternatives and similar repositories for Pink-Eye
Users that are interested in Pink-Eye are comparing it to the libraries listed below
Sorting:
- ☆19Apr 14, 2023Updated 2 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Using CVE-2023-21768 to manual map kernel mode driver☆197Mar 10, 2023Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Apr 21, 2023Updated 2 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆470Jan 3, 2022Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆17Dec 18, 2020Updated 5 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- ☆158May 21, 2024Updated last year
- ☆144Dec 10, 2022Updated 3 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- page table manipulation to gain physical r/w☆44May 7, 2024Updated last year
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- Hide external overlay by using SetWindowDisplayAffinity☆102Sep 5, 2021Updated 4 years ago
- Unsigned Kernel Mode Driver that does memory modifications☆12Oct 13, 2022Updated 3 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆207Dec 16, 2022Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- ☆23May 8, 2023Updated 2 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆224May 10, 2022Updated 3 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆22Feb 19, 2023Updated 3 years ago
- undetected eac mapper☆170May 3, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆382Aug 8, 2021Updated 4 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆314May 31, 2023Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆56Feb 26, 2023Updated 3 years ago