byte2mov / anti-breakpoint
anti breakpoint using job objects in a simple way.
☆12Updated last year
Alternatives and similar repositories for anti-breakpoint:
Users that are interested in anti-breakpoint are comparing it to the libraries listed below
- Anti Suspend and Detect Detaching from debuggers.☆12Updated last year
- RWX Section Abusing☆17Updated last year
- PAGE_GUARD based hooking library☆43Updated 2 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- manual mapping injector☆27Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year
- Just tried, unusable☆36Updated 6 months ago
- ☆27Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆34Updated 6 months ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆19Updated last year
- Driver shared section communication☆46Updated last month
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- Written in a couple hours, don't judge :)☆15Updated last year
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆40Updated 11 months ago
- Bypass using kernel driver (not finish).☆20Updated last year
- Header only UM AC "bypass"☆19Updated 11 months ago
- PoC kernel to usermode injection☆80Updated last year
- POC kernel driver with hidden system thread☆14Updated 11 months ago
- ☆46Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆42Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆16Updated 3 years ago
- ☆41Updated 2 years ago
- Simple memory obfuscator.☆24Updated 2 years ago
- Kernel Level NMI Callback Blocker☆80Updated 7 months ago
- A simple MmCopyMemory hook.☆37Updated 2 years ago
- cr3 shuffle driver☆37Updated last year
- Extracts eac's payload which is injected into the game at runtime.☆29Updated last year
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated last year