colby57 / sec_no_syscalls
Making syscall calls in regions with the SEC_NO_CHANGE flag
☆29Updated 6 months ago
Alternatives and similar repositories for sec_no_syscalls:
Users that are interested in sec_no_syscalls are comparing it to the libraries listed below
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆46Updated 11 months ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- A library to assist with memory & code protection.☆53Updated 10 months ago
- ☆67Updated last year
- ☆71Updated 2 years ago
- Just check hypervisor in ring0☆14Updated last year
- ☆71Updated 9 months ago
- ☆48Updated last year
- ☆31Updated 2 years ago
- page table manipulation to gain physical r/w☆42Updated 8 months ago
- Win32 PE (dll, sys, exe) remote manual mapper written on PHP with injector-client written on C++20☆64Updated last year
- Kernel Level NMI Callback Blocker☆61Updated 5 months ago
- Very easy to use pdb parsing library with only one header file,You can use it even if you are a fool.☆9Updated 10 months ago
- nmi stackwalking + module verification☆102Updated last year
- ☆21Updated 2 years ago
- Example driver on how to use SKLib☆31Updated 2 months ago
- ☆33Updated 2 years ago
- ☆50Updated 2 years ago
- ☆23Updated 2 months ago
- IoCreateDriver Implementation, it can be handful if you're trying to bypass anticheats☆65Updated 9 months ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆54Updated last year
- ☆15Updated 3 years ago
- Register a callback in Kernel from a manually mapped driver☆38Updated 3 years ago
- ☆27Updated last year
- ☆135Updated last year
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- clearing traces of a loaded driver☆46Updated 2 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago