eax-hash / smrtguard-killer
☆12Updated this week
Related projects: ⓘ
- x64 manual mapper using inline syscalls☆6Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 5 years ago
- using gpuz to load driver☆31Updated 5 years ago
- LSASS INJECTOR☆33Updated 5 years ago
- ☆60Updated this week
- ☆16Updated this week
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 4 years ago
- ☆28Updated this week
- ☆48Updated 9 months ago
- https://githacks.org/Shawick/goodeye.git☆43Updated 4 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ☆24Updated this week
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆78Updated 2 years ago
- Another method to anti ThreadHideFromDebugger☆34Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆53Updated 4 years ago
- ☆33Updated 4 years ago
- ☆33Updated this week
- realExtern.sys driver☆65Updated 3 years ago
- C/C++ example of InjectMouseInput function☆29Updated 3 years ago
- ☆46Updated this week
- ☆47Updated 5 years ago
- Some garbage drivers written for getting started☆62Updated 4 years ago
- ☆62Updated this week
- ☆37Updated this week
- ☆42Updated 2 years ago
- Only for Stress-Testing☆21Updated 2 years ago
- manual mapping injector☆25Updated 2 years ago
- mouseclassservicecallback detection via hook☆46Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆58Updated last year
- ☆36Updated this week
- ☆25Updated 6 years ago