Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.
☆297Dec 10, 2025Updated 2 months ago
Alternatives and similar repositories for unKover
Users that are interested in unKover are comparing it to the libraries listed below
Sorting:
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆591Aug 2, 2025Updated 7 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆388Jul 6, 2022Updated 3 years ago
- scan system / process integrity☆351Oct 22, 2024Updated last year
- ☆361May 11, 2025Updated 9 months ago
- kernel mode anti cheat☆642Aug 4, 2024Updated last year
- etw hook (syscall/infinity hook) compatible with the latest Windows version of PG☆325Apr 27, 2024Updated last year
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- ☆183May 20, 2022Updated 3 years ago
- A method to Disable DSE using .data ptr hooks☆39Feb 1, 2024Updated 2 years ago
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆169May 17, 2023Updated 2 years ago
- PoCs for Kernelmode rootkit techniques research.☆432Nov 4, 2025Updated 4 months ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆541Sep 2, 2022Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- Admin to Kernel code execution using the KSecDD driver☆264Apr 19, 2024Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆269Aug 31, 2022Updated 3 years ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆277Aug 25, 2023Updated 2 years ago
- ROP-based sleep obfuscation to evade memory scanners☆376Jun 22, 2025Updated 8 months ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆473Jan 3, 2022Updated 4 years ago
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- ☆223Mar 11, 2023Updated 2 years ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆243Sep 26, 2023Updated 2 years ago
- An x86-64 Code Virtualizer☆309Sep 26, 2024Updated last year
- Standard Kernel Library for Windows manipulation in C++☆201Jun 18, 2025Updated 8 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- PoC kernel to usermode injection☆105Feb 26, 2024Updated 2 years ago
- PE (and elf now!) bin2bin obfuscator☆820Oct 11, 2025Updated 4 months ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆623Feb 22, 2019Updated 7 years ago
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆204Sep 27, 2025Updated 5 months ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆385Aug 8, 2021Updated 4 years ago
- Windows Anti-Rootkit Tool☆546Dec 31, 2025Updated 2 months ago