can1357 / physical_mem_controllerLinks
A library to read physical memory and system-wide virtual memory.
☆126Updated 7 years ago
Alternatives and similar repositories for physical_mem_controller
Users that are interested in physical_mem_controller are comparing it to the libraries listed below
Sorting:
- Intercepting DeviceControl via WPP☆134Updated 5 years ago
- ☆153Updated 5 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆117Updated 6 years ago
- Easy Anti PatchGuard☆221Updated 4 years ago
- ☆146Updated 4 years ago
- ☆64Updated 12 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆111Updated 7 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆112Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆67Updated 6 years ago
- Disks for DMA☆104Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆84Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆164Updated 5 years ago
- Collect different versions of Crucial modules.☆142Updated 11 months ago
- Browse Page Tables on Windows (Page Table Viewer)☆210Updated 3 years ago
- Manual PE image mapper☆65Updated 11 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆118Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- ☆97Updated 7 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- Hooking kernel functions by abusing alignment☆243Updated 4 years ago
- ayy debuger☆89Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆188Updated last year
- Using DKOM to hide kernel mode drivers☆55Updated 7 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Capcom wrapper with safety in mind.☆80Updated 7 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated last year
- Elevate a process to be a protected process☆150Updated 5 years ago