A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
☆122Oct 19, 2025Updated 6 months ago
Alternatives and similar repositories for Eneio64-Driver-Exploits
Users that are interested in Eneio64-Driver-Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆325Mar 12, 2026Updated last month
- Kernel Level NMI Callback Blocker☆172Apr 23, 2026Updated last week
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- ☆61Apr 20, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repo contains EXPs about Vulnerable Windows Driver☆48May 22, 2024Updated last year
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆685Mar 24, 2026Updated last month
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- Windows hypervisor for Intel x64: defensive host hypervisor for Windows designed to mitigate kernel-level attacks including BYOVD, compat…☆259Mar 15, 2026Updated last month
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆113Apr 9, 2026Updated 3 weeks ago
- Windows kernel driver demonstrating kernel-to-usermode communication via shared memory sections☆103Apr 24, 2026Updated last week
- UEFI Bootkit Framework that attacks boot-time Code Integrity☆128Mar 15, 2026Updated last month
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆95Sep 28, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Just another .data pointer hook. This time it's hooking AfdIrpCallDispatch within Afd.sys☆12Feb 22, 2022Updated 4 years ago
- Here you can find some vulnerable Windows Kernel Drivers☆13Feb 21, 2025Updated last year
- ☆37Sep 26, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆79Sep 8, 2025Updated 7 months ago
- ☆29Aug 3, 2024Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 9 months ago
- find dll base addresses without PEB WALK☆163Jul 13, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DWM overlay without pattern scanning☆75Nov 3, 2025Updated 6 months ago
- ☆25Apr 28, 2024Updated 2 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- ☆58Mar 14, 2023Updated 3 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- Executing Kernel Routines via Syscall Table Hijack (Kernel Code Execution)☆61Jun 15, 2025Updated 10 months ago
- DWM Overlay without write .text☆121Sep 16, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 6 months ago
- Call Stack Spoofing for Rust☆216Jan 28, 2026Updated 3 months ago
- Help red teams find opsec processes during engagements☆43Dec 7, 2024Updated last year
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆270Mar 16, 2026Updated last month
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆217Dec 16, 2022Updated 3 years ago