PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and prevent access from external processes.
☆57May 23, 2022Updated 3 years ago
Alternatives and similar repositories for PointerGuard
Users that are interested in PointerGuard are comparing it to the libraries listed below
Sorting:
- ☆50Apr 19, 2020Updated 5 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- ☆37May 21, 2022Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆55Aug 9, 2020Updated 5 years ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 2 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- 🪝 Various EPT hook detection approaches☆143Updated this week
- ☆49Feb 21, 2022Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆385Jan 29, 2022Updated 4 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- Code for Battleyes shellcode☆239Nov 11, 2021Updated 4 years ago
- Kernel Lazy Importer☆134Apr 13, 2024Updated last year
- Memory integrity check with CRC32 instruction, section-based☆50May 25, 2025Updated 9 months ago
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 6 years ago
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆83Nov 5, 2023Updated 2 years ago
- 09/2021 reversal of EasyAntiCheat driver☆235Dec 21, 2021Updated 4 years ago
- Register a callback in Kernel from a manually mapped driver☆47Jun 1, 2021Updated 4 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆110Nov 13, 2023Updated 2 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- Its a header-only runtime tool for importing functions from modules.☆45Mar 20, 2023Updated 2 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- ☆136Aug 6, 2022Updated 3 years ago
- windows kernel pagehook☆41Oct 30, 2022Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago