☆51Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for kdmapper-mdl
Users that are interested in kdmapper-mdl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆56Jul 24, 2021Updated 4 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Nov 4, 2021Updated 4 years ago
- ☆75Dec 17, 2019Updated 6 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆389Aug 8, 2021Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- ☆68Aug 31, 2021Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆132Apr 23, 2022Updated 3 years ago
- 不使用3环挂钩进行DWM桌面绘制☆83Dec 9, 2021Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- ☆185May 5, 2019Updated 6 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- Global DLL injector☆71May 16, 2021Updated 4 years ago
- Written in a couple hours, don't judge :)☆17Jun 3, 2023Updated 2 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- Easy Anti PatchGuard☆222Apr 9, 2021Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Jan 2, 2020Updated 6 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆637Dec 26, 2024Updated last year
- noob hooking dwm for overlay☆84Nov 24, 2020Updated 5 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆475Jan 3, 2022Updated 4 years ago
- update face injector by KANKOSHEV☆290Oct 27, 2021Updated 4 years ago
- battleye shellcode☆18Jan 10, 2020Updated 6 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Code for Battleyes shellcode☆237Nov 11, 2021Updated 4 years ago
- ☆103Mar 26, 2022Updated 3 years ago
- 内核驱动加载/卸载痕迹清理,努力绕过反作弊吧 PiDDBCacheTable and MmLastUnloadedDriver☆189Feb 11, 2023Updated 3 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Dec 27, 2022Updated 3 years ago