Xyrem / Arbitrary-Physical-Memory-RWView external linksLinks
☆38Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Arbitrary-Physical-Memory-RW
Users that are interested in Arbitrary-Physical-Memory-RW are comparing it to the libraries listed below
Sorting:
- ☆17Apr 21, 2022Updated 3 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with…☆15Dec 23, 2020Updated 5 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆148Jan 24, 2024Updated 2 years ago
- RWX Section Abusing☆16Nov 19, 2023Updated 2 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Hide external overlay by using SetWindowDisplayAffinity☆103Sep 5, 2021Updated 4 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- Compileable POC of namazso's x64 return address spoofer.☆50Jun 10, 2020Updated 5 years ago
- ☆23May 17, 2022Updated 3 years ago
- manually map driver for a signed driver memory space☆171Mar 11, 2021Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆174Mar 9, 2022Updated 3 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 10 months ago
- ☆117Feb 11, 2022Updated 4 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Oct 20, 2020Updated 5 years ago
- ☆34Mar 3, 2024Updated last year
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- ☆16Oct 31, 2021Updated 4 years ago
- mouseclassservicecallback detection via hook☆52Feb 7, 2022Updated 4 years ago
- 对debughelp的二次开发☆11Feb 20, 2023Updated 2 years ago
- ☆63Sep 28, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago