ZaweSec / KasperskyHook_NewKSDriverView external linksLinks
☆34Aug 14, 2023Updated 2 years ago
Alternatives and similar repositories for KasperskyHook_NewKSDriver
Users that are interested in KasperskyHook_NewKSDriver are comparing it to the libraries listed below
Sorting:
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 5 months ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Interprocess communication library, providing the ability to call functions from each other☆20Oct 3, 2019Updated 6 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Jul 9, 2021Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- ☆15Mar 28, 2015Updated 10 years ago
- ☆23May 8, 2023Updated 2 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Apr 12, 2020Updated 5 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆119Feb 8, 2022Updated 4 years ago
- Static Library For Windows Drivers☆41Dec 13, 2025Updated 2 months ago
- State of the art DLL injector that took 20 minutes to make☆226Aug 16, 2023Updated 2 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆18Apr 9, 2024Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆30Nov 16, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- 过TP驱动☆28Feb 11, 2020Updated 6 years ago
- ☆223May 10, 2022Updated 3 years ago
- ☆68Dec 17, 2020Updated 5 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- ☆163Oct 29, 2020Updated 5 years ago
- Process hiding library☆19Feb 23, 2020Updated 5 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆82Nov 13, 2023Updated 2 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆26Nov 14, 2023Updated 2 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Aug 21, 2024Updated last year
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆164Jun 14, 2024Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago