gmh5225 / ida-find-.data-ptr
A simple ida python script to find .data ptr
☆48Updated last year
Alternatives and similar repositories for ida-find-.data-ptr:
Users that are interested in ida-find-.data-ptr are comparing it to the libraries listed below
- ☆71Updated 2 years ago
- Kernel Level NMI Callback Blocker☆61Updated 5 months ago
- Example driver on how to use SKLib☆31Updated 2 months ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆10Updated 3 years ago
- ☆50Updated 2 years ago
- ☆71Updated 9 months ago
- Kernel ReClassEx☆64Updated last year
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- ☆67Updated last year
- ☆135Updated last year
- Discarded Section Manual Map☆67Updated 4 years ago
- ☆31Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- ☆66Updated 2 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆80Updated 2 years ago
- 将驱动映射到会话空间☆34Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆46Updated 11 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆82Updated last year
- nmi stackwalking + module verification☆102Updated last year
- ☆47Updated last year
- ☆47Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆121Updated 2 years ago
- A library to assist with memory & code protection.☆53Updated 10 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆72Updated last year
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆54Updated last year
- ☆40Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆65Updated last year
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago