defparam / BAR-TenderLinks
An FPGA I/O Device which services physical memory reads/writes via UMDF2 driver
☆56Updated 7 years ago
Alternatives and similar repositories for BAR-Tender
Users that are interested in BAR-Tender are comparing it to the libraries listed below
Sorting:
- PCIe Screamer - TLPs experiments...☆182Updated 2 years ago
- DMA attacks over PCI Express based on Xilinx Zynq-7000 series SoC☆68Updated 4 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆118Updated 6 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆65Updated last year
- BattlEye BEClient<->BEService usermode emulator☆82Updated 5 years ago
- Apex Legends QEMU Cheat☆54Updated 5 years ago
- DLL injector that bypasses some checks for valid certificates.☆37Updated 7 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆39Updated 7 years ago
- Intercepting DeviceControl via WPP☆136Updated 5 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆113Updated 7 years ago
- ☆66Updated 6 years ago
- Provides io.ReadWriter interface for a PCIe screamer device☆30Updated 4 years ago
- ☆41Updated 6 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆33Updated 4 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆100Updated 5 years ago
- usermode standalone kernel interface☆111Updated 7 years ago
- A library to read physical memory and system-wide virtual memory.☆127Updated 7 years ago
- Capcom wrapper with safety in mind.☆82Updated 7 years ago
- Capcom driver exploit wrapper☆127Updated 6 years ago
- ☆25Updated 7 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- ☆50Updated 4 years ago
- Hooking kernel functions by abusing alignment☆245Updated 4 years ago
- disable most common windowsx64 systems patchguard☆86Updated 6 years ago
- Hypervisor based tool for monitoring system register accesses.☆148Updated 7 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆84Updated 10 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆97Updated 5 years ago
- A x86/64 library for detouring functions on Windows OS☆50Updated 3 years ago
- This bypass is for anti cheats like battleye and EAC. All this does is abuse lsass's handles and use them for yourself. This is quite use…☆108Updated 4 years ago