Manually Mapped Windows Kernel Driver + Usermode API for Arbitrary R/W to UM process via a UM thread trapped in kernel, synchronized with Windows Event Objects
☆15Dec 23, 2020Updated 5 years ago
Alternatives and similar repositories for EventSyncDriver
Users that are interested in EventSyncDriver are comparing it to the libraries listed below
Sorting:
- bypass CRC☆12May 3, 2018Updated 7 years ago
- Visual Studio template for GNU-EFI☆16May 16, 2022Updated 3 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Oct 27, 2017Updated 8 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- ☆38Nov 30, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆14May 10, 2021Updated 4 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Apr 17, 2021Updated 4 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Jun 26, 2021Updated 4 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Libraries written in inline assembly☆19Aug 7, 2023Updated 2 years ago
- EQU8 User-Mode Bypass and Injector☆11Aug 13, 2021Updated 4 years ago
- ☆35Oct 10, 2023Updated 2 years ago
- ☆31Oct 1, 2021Updated 4 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆87Apr 25, 2019Updated 6 years ago
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- d☆14Sep 5, 2025Updated 5 months ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- POC kernel driver with hidden system thread☆13May 14, 2024Updated last year
- ☆14Apr 7, 2018Updated 7 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Fortnite cheat , Fortnite External , Kernel , Fortnite UD , undetected☆74Jun 13, 2024Updated last year
- ☆39Oct 29, 2020Updated 5 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago