page table manipulation to gain physical r/w
☆44May 7, 2024Updated last year
Alternatives and similar repositories for supermode
Users that are interested in supermode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 3 months ago
- ☆48Jul 7, 2024Updated last year
- ☆29Aug 3, 2024Updated last year
- ☆19Feb 5, 2025Updated last year
- partially disable patchguard up to win11 21H2☆19Jun 3, 2024Updated last year
- using wnbios64.sys for arbitrary r/w☆15Oct 12, 2025Updated 5 months ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- ☆18Jan 11, 2026Updated 2 months ago
- ☆367May 11, 2025Updated 10 months ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆280Mar 16, 2026Updated last week
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆84Nov 13, 2023Updated 2 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- A simple UM + KM example of how to bypass EAC CR3☆186Oct 13, 2025Updated 5 months ago
- communicate with kernel using a image on disk☆16May 1, 2024Updated last year
- cr3 shuffle driver☆80Mar 24, 2024Updated last year
- A simple present scene, kernel allocation injector.☆27Jun 12, 2022Updated 3 years ago
- Compile-time + Lifetime, Usermode + Kernelmode, safe and lightweight string crypter library for C++17+, based on skCrypter☆19Jan 17, 2026Updated 2 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- ☆12Jul 12, 2022Updated 3 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- ☆17Dec 18, 2020Updated 5 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- manual map unsigned driver over signed memory☆222Apr 11, 2024Updated last year
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- ☆30Dec 20, 2025Updated 3 months ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Mar 16, 2026Updated last week
- r/w virtual memory without attach☆224Oct 19, 2023Updated 2 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- State of the art DLL injector that took 20 minutes to make☆227Aug 16, 2023Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆106Mar 16, 2026Updated last week
- x64 assembler library☆31Jun 7, 2024Updated last year