PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and prevent access from external processes.
☆57May 23, 2022Updated 3 years ago
Alternatives and similar repositories for PointerGuard
Users that are interested in PointerGuard are comparing it to the libraries listed below
Sorting:
- ☆50Apr 19, 2020Updated 5 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- ☆37May 21, 2022Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- Memory integrity check with CRC32 instruction, section-based☆50May 25, 2025Updated 9 months ago
- External Hooking ( Bypasss process byte patching checks | Injector included )☆22Mar 12, 2023Updated 3 years ago
- A minimalistic way to spoof return addresses without using exceptions☆18Jul 26, 2022Updated 3 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆387Jan 29, 2022Updated 4 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆54Aug 9, 2020Updated 5 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 7 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆82Nov 5, 2023Updated 2 years ago
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- 🪝 Various EPT hook detection approaches☆143Feb 22, 2026Updated 3 weeks ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆25Aug 9, 2021Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- A library to assist with memory & code protection.☆66Mar 7, 2024Updated 2 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Jan 1, 2025Updated last year
- ☆18Jan 11, 2026Updated 2 months ago
- Its a header-only runtime tool for importing functions from modules.☆45Mar 20, 2023Updated 3 years ago
- Code for Battleyes shellcode☆237Nov 11, 2021Updated 4 years ago
- A collection of Anti-RE & Anti-Dump methods☆28Jan 5, 2021Updated 5 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Jan 15, 2022Updated 4 years ago
- Simulate SendInput with ClassService☆35Sep 5, 2018Updated 7 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 5 years ago
- Register a callback in Kernel from a manually mapped driver☆47Jun 1, 2021Updated 4 years ago
- 09/2021 reversal of EasyAntiCheat driver☆237Dec 21, 2021Updated 4 years ago
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆437Oct 8, 2025Updated 5 months ago
- UD overlay using SetWindowsHookEx☆16Apr 29, 2022Updated 3 years ago