Xyrem / Arbitrary-Physical-Memory-RW
☆36Updated last year
Related projects: ⓘ
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated 7 months ago
- ☆19Updated 2 years ago
- ☆15Updated this week
- Hijack NotifyRoutine for a kernelmode thread☆40Updated 2 years ago
- ☆19Updated 7 months ago
- ☆15Updated this week
- ☆42Updated 2 years ago
- simple driver to read and write☆15Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- ☆25Updated this week
- ☆31Updated this week
- fecurity executor from factory☆32Updated 2 years ago
- A simple MmCopyMemory hook.☆32Updated 2 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆29Updated last year
- ☆20Updated this week
- manual mapping injector☆25Updated 2 years ago
- detect hypervisor with Nmi Callback☆32Updated last year
- Disk based DMA for ATA and SCSI☆13Updated 11 months ago
- Achieving code execution through abusing VEH☆15Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Communicate from ring-0 to ring-3 using NamedPipes.☆9Updated last year
- clearing traces of a loaded driver☆45Updated 2 years ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆21Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆27Updated 2 years ago
- Stealing signatures from pe files☆15Updated 2 years ago
- Bypassing kernel patch protection runtime☆19Updated last year
- Written in a couple hours, don't judge :)☆10Updated last year
- Execute anything in a legit memory region by attacking a windows driver☆21Updated last year
- hooks gServerHandlers xxxEventWndProc☆12Updated 2 years ago