UAC - Cheat developer platform
☆28Oct 29, 2021Updated 4 years ago
Alternatives and similar repositories for UAC
Users that are interested in UAC are comparing it to the libraries listed below
Sorting:
- ☆36Mar 19, 2019Updated 6 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- POC of integrity checks☆14May 31, 2021Updated 4 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆34Jul 19, 2021Updated 4 years ago
- fix wow obfucated IAT☆10Aug 4, 2021Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Windows driver for spoofing serial number of HDDs☆221Sep 8, 2022Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- ☆185May 5, 2019Updated 6 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Cool kernel communication method.☆100Jun 27, 2021Updated 4 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- ☆15Dec 25, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Proof of Concept Kernel-User Communication using System Thread.☆14Sep 24, 2023Updated 2 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆17Mar 14, 2025Updated 11 months ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- ☆32Apr 20, 2023Updated 2 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- LLVM based devirtualization PoC’s.☆21Dec 11, 2021Updated 4 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Hiding the window from screenshots using the function win32kfull::GreProtectSpriteContent☆628Dec 26, 2024Updated last year
- ☆19Jan 12, 2020Updated 6 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Aug 20, 2023Updated 2 years ago
- Register a callback in Kernel from a manually mapped driver☆47Jun 1, 2021Updated 4 years ago