Demo proof of concept for shadow regions, and implementation of HyperDeceit.
☆315May 31, 2023Updated 2 years ago
Alternatives and similar repositories for Yumekage
Users that are interested in Yumekage are comparing it to the libraries listed below
Sorting:
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆379Jun 3, 2023Updated 2 years ago
- base for testing☆187Sep 28, 2024Updated last year
- ☆34Apr 11, 2023Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆366Aug 18, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆132Apr 26, 2023Updated 2 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- kernel mode anti cheat☆642Aug 4, 2024Updated last year
- ☆361May 11, 2025Updated 9 months ago
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆164Sep 22, 2023Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- ☆183May 20, 2022Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆325Apr 26, 2022Updated 3 years ago
- Lightweight Intel VT-x Hypervisor.☆666Dec 17, 2024Updated last year
- ☆193May 1, 2023Updated 2 years ago
- xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, all…☆298Jan 18, 2024Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- ☆145Dec 10, 2022Updated 3 years ago
- State of the art DLL injector that took 20 minutes to make☆227Aug 16, 2023Updated 2 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Module extending manual mapper☆382Mar 28, 2020Updated 5 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆553Nov 12, 2022Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆385Aug 8, 2021Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆269Aug 31, 2022Updated 3 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆408Apr 19, 2025Updated 10 months ago
- Native code virtualizer for x64 binaries☆519Dec 20, 2024Updated last year
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆632Dec 26, 2024Updated last year
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆277Aug 25, 2023Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Aug 16, 2023Updated 2 years ago
- Example of reading process memory through kernel special APC☆111Apr 21, 2023Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,281Feb 14, 2026Updated 3 weeks ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆379Mar 15, 2024Updated last year