Only for Stress-Testing
☆26Apr 9, 2022Updated 3 years ago
Alternatives and similar repositories for HideDriverTesting
Users that are interested in HideDriverTesting are comparing it to the libraries listed below
Sorting:
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- ☆37May 21, 2022Updated 3 years ago
- Use GDI in KernelMode☆26Oct 1, 2022Updated 3 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ☆42Jul 1, 2022Updated 3 years ago
- 🪝 Various EPT hook detection approaches☆143Updated this week
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Dec 25, 2021Updated 4 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- ☆17Apr 21, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- Written in a couple hours, don't judge :)☆17Jun 3, 2023Updated 2 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- A simple MmCopyMemory hook.☆38Jul 11, 2022Updated 3 years ago
- ☆24May 17, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- ☆19Apr 9, 2024Updated last year
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- ☆33Dec 22, 2020Updated 5 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆385Jan 29, 2022Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆115Dec 28, 2022Updated 3 years ago
- ☆47Nov 26, 2020Updated 5 years ago