colby57 / sec_no_syscalls
A Windows Direct Syscall Library
☆36Updated this week
Alternatives and similar repositories for sec_no_syscalls:
Users that are interested in sec_no_syscalls are comparing it to the libraries listed below
- Win32 PE (dll, sys, exe) remote manual mapper written on PHP with injector-client written on C++20☆67Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆50Updated 2 years ago
- Just check hypervisor in ring0☆15Updated last year
- ☆73Updated last year
- A detailed analysis of the SCP: SL anti-cheat☆31Updated 2 years ago
- Kernel Lazy Importer☆112Updated last year
- ☆14Updated 2 years ago
- ☆30Updated 2 years ago
- PoC over some VMP features☆20Updated last year
- anti crack system protector☆96Updated last year
- nmi stackwalking + module verification☆114Updated last year
- ☆15Updated 4 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year
- Example driver on how to use SKLib☆44Updated 5 months ago
- ☆75Updated last year
- ☆69Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆40Updated 11 months ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆70Updated 3 years ago
- ☆22Updated 5 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆25Updated last year
- Discarded Section Manual Map☆67Updated 4 years ago
- ☆14Updated 3 years ago
- ☆140Updated last year
- ☆53Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 2 years ago
- A library to assist with memory & code protection.☆56Updated last year
- ☆55Updated 2 years ago
- page table manipulation to gain physical r/w☆40Updated 11 months ago
- ☆121Updated 2 years ago