Xyrem / YumekageView external linksLinks
Demo proof of concept for shadow regions, and implementation of HyperDeceit.
☆313May 31, 2023Updated 2 years ago
Alternatives and similar repositories for Yumekage
Users that are interested in Yumekage are comparing it to the libraries listed below
Sorting:
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆376Jun 3, 2023Updated 2 years ago
- base for testing☆186Sep 28, 2024Updated last year
- ☆34Apr 11, 2023Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Apr 9, 2023Updated 2 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆132Apr 26, 2023Updated 2 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- kernel mode anti cheat☆628Aug 4, 2024Updated last year
- ☆355May 11, 2025Updated 9 months ago
- nmi stackwalking + module verification☆161Dec 28, 2023Updated 2 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆162Sep 22, 2023Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆192Jul 11, 2023Updated 2 years ago
- ☆184May 20, 2022Updated 3 years ago
- A mapper that maps shellcode into loaded large page drivers☆321Apr 26, 2022Updated 3 years ago
- Lightweight Intel VT-x Hypervisor.☆660Dec 17, 2024Updated last year
- ☆193May 1, 2023Updated 2 years ago
- xigmapper is a driver manual mapper that loads your driver before Vanguard, but after critical system infrastructure has been set up, all…☆294Jan 18, 2024Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆205Aug 18, 2023Updated 2 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- State of the art DLL injector that took 20 minutes to make☆226Aug 16, 2023Updated 2 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆547Nov 12, 2022Updated 3 years ago
- Module extending manual mapper☆380Mar 28, 2020Updated 5 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆377Aug 8, 2021Updated 4 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆163Jul 31, 2022Updated 3 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆408Apr 19, 2025Updated 9 months ago
- Native code virtualizer for x64 binaries☆515Dec 20, 2024Updated last year
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆624Dec 26, 2024Updated last year
- Example of reading process memory through kernel special APC☆110Apr 21, 2023Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆276Aug 25, 2023Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Aug 16, 2023Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆265Aug 31, 2022Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,272Apr 1, 2024Updated last year
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆376Mar 15, 2024Updated last year