can1357 / physical_mem_controllerLinks
A library to read physical memory and system-wide virtual memory.
☆126Updated 7 years ago
Alternatives and similar repositories for physical_mem_controller
Users that are interested in physical_mem_controller are comparing it to the libraries listed below
Sorting:
- Intercepting DeviceControl via WPP☆133Updated 5 years ago
- ☆153Updated 5 years ago
- x64 syscall caller in C++.☆90Updated 6 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆108Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- ☆143Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆184Updated last year
- 🪝 Different aproaches to detecting EPT hooks☆109Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆84Updated 4 years ago
- Easy Anti PatchGuard☆219Updated 4 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆171Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆67Updated 6 years ago
- ☆64Updated 12 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆202Updated 3 years ago
- Collect different versions of Crucial modules.☆140Updated 10 months ago
- hook msr by amd svm☆120Updated 5 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆116Updated last year
- ☆167Updated 7 years ago
- manually map driver for a signed driver memory space☆157Updated 4 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- ☆97Updated 7 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆71Updated 5 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Kernel Lazy Importer☆119Updated last year
- Disks for DMA☆105Updated 4 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆117Updated 6 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆145Updated 3 years ago