ekknod / MouseClassServiceCallbackTrick
☆49Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MouseClassServiceCallbackTrick
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- Calling "own" MouseClassServiceCallback☆60Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆80Updated last year
- clearing traces of a loaded driver☆44Updated 2 years ago
- ☆41Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- mouseclassservicecallback detection via hook☆48Updated 2 years ago
- ☆50Updated 11 months ago
- ☆48Updated last year
- ☆55Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆63Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆45Updated 8 months ago
- ☆33Updated 2 years ago
- Hiding a system thread against conventional means of detection☆35Updated 4 years ago
- ☆32Updated 2 years ago
- ☆78Updated 3 years ago
- Kernel driver that moves the mouse☆69Updated 2 years ago
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆74Updated 3 years ago
- An Undetected BE Kernel Driver I developed, Will probably be detected upon releasing this but can be made undetected very easily. Does no…☆54Updated 2 months ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- Discarded Section Manual Map☆66Updated 4 years ago
- ☆70Updated 2 years ago
- kinda custom data ptr swap communication method☆23Updated last year
- ☆64Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆30Updated 7 months ago
- x64 manual mapper using inline syscalls☆5Updated 3 years ago
- Windows Kernel Misc☆22Updated last year