cocafe / physmemLinks
Physical memory and MMIO read/write command line utility via asmmap64 on Windows
☆17Updated 2 years ago
Alternatives and similar repositories for physmem
Users that are interested in physmem are comparing it to the libraries listed below
Sorting:
- Example of using Windows Platform Binary Table (WPBT)☆22Updated 2 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 2 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆27Updated last week
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- Example WDF/KMDF driver and test app demonstrating the "inverted call model"☆36Updated 5 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆42Updated 4 years ago
- Use ntdll/ntoskrnl to implement Kernel32, Advapi32 and other APIs. It includes user-mode and kernel-mode.☆87Updated last month
- Hypervisor-based debugger for AMD processors☆58Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆72Updated last year
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆46Updated last year
- Debug Print viewer (user and kernel)☆66Updated last year
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆60Updated 7 months ago
- type 1 thin hypervisor written in C++☆15Updated 6 months ago
- ☆48Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- Windows Research Kernel VS2022 Solution☆33Updated 10 months ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Global DLL injector☆68Updated 4 years ago
- Tiny C x86_64 function detouring library.☆27Updated last month
- Windows PDB parser for kernel-mode environment.☆98Updated last month
- A simple way to spoof return addresses using an exception handler☆32Updated 2 years ago
- https://www.codeproject.com/Articles/5348168/Disable-Driver-Signature-Enforcement-with-DSE-Patc☆19Updated last year
- A bunch of architectural headers for i386 and AMD64☆40Updated last year
- A pure C++17 implementation of WPP software tracing☆19Updated 4 years ago
- Elevate arbitrary MSR writes to kernel execution.☆37Updated last year
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆26Updated last year
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆31Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆60Updated last year
- Virtualization Simply Code☆25Updated 3 years ago