☆25Mar 3, 2019Updated 6 years ago
Alternatives and similar repositories for DriverTutorial
Users that are interested in DriverTutorial are comparing it to the libraries listed below
Sorting:
- ☆16Mar 1, 2019Updated 6 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Windows Server 2K3 NT 5☆12Apr 14, 2021Updated 4 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- Shareds for kernel developement☆29Dec 23, 2013Updated 12 years ago
- NVIDIA GPU utility for Win32 and .NET wrapper☆11Aug 1, 2022Updated 3 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- force delete runing .exe application file.or delete any locked file☆74Mar 21, 2023Updated 2 years ago
- External cheat base with DirectX overlay☆20Jul 25, 2018Updated 7 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- ☆24Mar 4, 2019Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- APEX-EACBypass(usermode)☆48Feb 26, 2019Updated 7 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- iSwordSDK (Provide Powerful Kernel API For Ring3 Applications)☆15Mar 25, 2022Updated 3 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- ☆14Mar 8, 2019Updated 6 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- ☆14May 1, 2021Updated 4 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Mar 5, 2019Updated 6 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- WoW64 -> x64☆18Oct 1, 2016Updated 9 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- 小型主动防御引擎☆57Jun 24, 2016Updated 9 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- ☆24Feb 18, 2018Updated 8 years ago
- Example library for how to dynamically/statically hook/intercept unmanaged functions and APIs☆13Nov 9, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- Remote memory library in C++17.☆34May 31, 2018Updated 7 years ago