exploder2013 / TDL-Exploit-DriverLinks
A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any process memory and some other useful functions.
☆21Updated 7 years ago
Alternatives and similar repositories for TDL-Exploit-Driver
Users that are interested in TDL-Exploit-Driver are comparing it to the libraries listed below
Sorting:
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- A Windows driver used to facilitate DLL injection☆26Updated 7 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Updated 7 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- ☆10Updated 7 years ago
- ☆14Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- ☆8Updated 7 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- Simple program for static hooking dynamic libraries in executable application☆23Updated 11 years ago
- ☆26Updated 8 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- ☆17Updated 8 years ago
- Reverse engineering AddVectoredExceptionHandler☆3Updated 3 years ago
- ☆24Updated 7 years ago
- ☆33Updated 7 years ago
- ☆15Updated last year
- ☆14Updated 6 years ago
- UI application that can compare PE images in memory or in raw PE file☆18Updated 11 years ago
- Kernel Inject Process☆11Updated 8 years ago
- windows kernel File redirection☆20Updated 10 years ago
- ☆14Updated 8 years ago
- WIP - Play with Intel VM Extensions☆21Updated 8 years ago
- ☆33Updated 4 years ago
- Software Distribution Service☆12Updated 10 years ago
- old code from 2007/2008 which uses split TLB to trace OEP☆16Updated 7 years ago
- New handle stealing technique for windows apps☆13Updated 7 years ago
- ☆11Updated 7 years ago