Capcom wrapper with safety in mind.
☆83May 27, 2018Updated 7 years ago
Alternatives and similar repositories for safe_capcom
Users that are interested in safe_capcom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A library to read physical memory and system-wide virtual memory.☆129May 3, 2018Updated 7 years ago
- Literally, the perfect injector.☆989Apr 13, 2023Updated 3 years ago
- Capcom driver exploit wrapper☆131May 24, 2019Updated 6 years ago
- ☆32Oct 31, 2018Updated 7 years ago
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- r0akmap is a PoC driver manual mapper based on r0ak☆37Aug 18, 2018Updated 7 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆184Nov 30, 2017Updated 8 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Nov 24, 2017Updated 8 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆122Mar 30, 2018Updated 8 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- driver manual mapper (outdated/for educational purposes)☆115May 17, 2019Updated 6 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Sep 14, 2020Updated 5 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- ☆185May 5, 2019Updated 6 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- PoC for detecting and dumping process hollowing code injection☆53Oct 23, 2018Updated 7 years ago
- Windows driver for spoofing serial number of HDDs☆223Sep 8, 2022Updated 3 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆906Nov 21, 2019Updated 6 years ago
- Process path modification x64☆60Jul 18, 2018Updated 7 years ago
- Reversed C++ source code from the CAPCOM.SYS driver☆15Sep 28, 2016Updated 9 years ago
- solana arbitrage bot which optimize maximum profit with multi hop spam method, dynamic trade amount. Using geyser grpc and shred steam in…☆450Mar 2, 2026Updated last month
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- hook msr by amd svm☆128Dec 30, 2019Updated 6 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 7 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆22Oct 27, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆47Nov 26, 2020Updated 5 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- easy to use vtable hook with RTTI support☆24Nov 12, 2019Updated 6 years ago
- disable most common windowsx64 systems patchguard☆87Dec 29, 2018Updated 7 years ago
- A collection of various vulnerable (mostly physical memory exposing) drivers.☆463Jun 15, 2022Updated 3 years ago