A library to read physical memory and system-wide virtual memory.
☆129May 3, 2018Updated 7 years ago
Alternatives and similar repositories for physical_mem_controller
Users that are interested in physical_mem_controller are comparing it to the libraries listed below
Sorting:
- Capcom wrapper with safety in mind.☆83May 27, 2018Updated 7 years ago
- Literally, the perfect injector.☆978Apr 13, 2023Updated 2 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- ☆111Nov 13, 2023Updated 2 years ago
- ☆156Oct 29, 2019Updated 6 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆226Nov 24, 2017Updated 8 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆121Aug 10, 2020Updated 5 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆11Jul 11, 2019Updated 6 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆634Mar 19, 2019Updated 7 years ago
- A wrapper library around native windows sytem APIs☆445Feb 2, 2021Updated 5 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆200Oct 19, 2016Updated 9 years ago
- base for testing☆187Sep 28, 2024Updated last year
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- CFB is a ProcMon-style tool designed to assist capturing IRPs sent to Windows drivers.☆332Mar 26, 2024Updated last year
- Hooking kernel functions by abusing alignment☆249Jan 5, 2021Updated 5 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆113Aug 28, 2016Updated 9 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆120Mar 30, 2018Updated 7 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- x86-64 virtual machine and disassembler☆148Nov 23, 2019Updated 6 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆346Apr 27, 2020Updated 5 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- ☆225Mar 11, 2023Updated 3 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago