armasm / EasyAntiPatchGuardLinks
Easy Anti PatchGuard
☆221Updated 4 years ago
Alternatives and similar repositories for EasyAntiPatchGuard
Users that are interested in EasyAntiPatchGuard are comparing it to the libraries listed below
Sorting:
- ☆167Updated 3 years ago
- ☆206Updated 2 years ago
- a Windows kernel Pdb parsing and downloading library that running purely in kernel mode without any R3 programs.☆154Updated 9 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆143Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆216Updated 4 years ago
- Hide codes/data in the kernel address space.☆190Updated 4 years ago
- Kernel LdrLoadDll injector☆260Updated 6 years ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆137Updated 3 years ago
- ☆153Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- r/w virtual memory without attach☆181Updated last year
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆302Updated 5 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆188Updated 8 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆188Updated last year
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆327Updated 2 years ago
- Simple Intel VT-x hypervisor☆308Updated last year
- Kernel Lazy Importer☆121Updated last year
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆248Updated 4 months ago
- ☆181Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆164Updated 5 years ago
- ShotHv☆143Updated 3 years ago
- ☆160Updated 4 years ago
- ☆125Updated 5 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆101Updated 3 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- Kernel-Mode extended version of https://github.com/microsoft/Detours☆167Updated 3 weeks ago
- Collect different versions of Crucial modules.☆142Updated 11 months ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆160Updated last year