arielkoren / DisablePatchGuardLinks
disable most common windowsx64 systems patchguard
☆85Updated 6 years ago
Alternatives and similar repositories for DisablePatchGuard
Users that are interested in DisablePatchGuard are comparing it to the libraries listed below
Sorting:
- Intercepting DeviceControl via WPP☆134Updated 5 years ago
- Capcom wrapper with safety in mind.☆80Updated 7 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆117Updated 6 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Updated 6 years ago
- fix vmprotect import function used unicorn-engine.☆93Updated 2 years ago
- Disable Driver Callbacks☆105Updated 7 years ago
- Manual PE image mapper☆65Updated 11 years ago
- ☆97Updated 7 years ago
- ☆125Updated 5 years ago
- ayy debuger☆89Updated last year
- ☆153Updated 5 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆128Updated 7 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆111Updated 7 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆69Updated 5 years ago
- hook msr by amd svm☆121Updated 5 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 6 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆114Updated 8 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆117Updated 8 years ago
- usermode standalone kernel interface☆111Updated 6 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆78Updated 14 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- ☆42Updated 6 years ago
- ☆66Updated 5 years ago
- A library to read physical memory and system-wide virtual memory.☆126Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago