backengineering / msrexec
Elevate arbitrary MSR writes to kernel execution.
☆32Updated last year
Alternatives and similar repositories for msrexec:
Users that are interested in msrexec are comparing it to the libraries listed below
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆51Updated 2 years ago
- Compileable POC of namazso's x64 return address spoofer.☆51Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- ☆15Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- ☆26Updated 3 years ago
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆17Updated last year
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- ☆59Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆18Updated 4 years ago
- A poc that abuses Enclave☆37Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆39Updated 4 months ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆42Updated 3 weeks ago
- ☆29Updated 3 years ago
- C/C++ antidebugging library for Windows☆17Updated 2 months ago
- Header-only C++ library for producing PE files.☆31Updated last year
- silence file system monitoring components by hooking their minifilters☆56Updated last year
- Windows driver template, using C++20 & cmake & GithubActions☆22Updated 7 months ago
- Collection of Cheat dumps for Research and Detection.☆12Updated this week
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆27Updated 8 months ago
- ☆24Updated last year