Experiment to use sections as User/Kernelmode comm vector
☆22Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for shared-kernel-user-section-driver
Users that are interested in shared-kernel-user-section-driver are comparing it to the libraries listed below
Sorting:
- ☆34Apr 11, 2023Updated 2 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- ☆18Jan 11, 2026Updated 2 months ago
- ☆15Mar 13, 2023Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 3 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- ☆23May 8, 2023Updated 2 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- https://www.huorong.cn/☆15Apr 16, 2024Updated last year
- ☆17Oct 31, 2022Updated 3 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- Walks through the 4-level paging structures in Windows x64☆13Feb 12, 2023Updated 3 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- ☆20May 17, 2022Updated 3 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆77Oct 28, 2021Updated 4 years ago
- Executes Read/Write process memory with `NtQueryCompositionSurfaceStatistics`☆23Feb 10, 2024Updated 2 years ago
- base for testing☆187Sep 28, 2024Updated last year
- ☆12Jun 30, 2019Updated 6 years ago
- Open source anti cheat engine☆43Jul 9, 2024Updated last year
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆21May 25, 2021Updated 4 years ago
- Communicate from ring-0 to ring-3 using NamedPipes.☆10Feb 22, 2023Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Jan 2, 2020Updated 6 years ago
- ☆12Jul 12, 2022Updated 3 years ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆133May 17, 2023Updated 2 years ago
- A Windows Memory driver for game hacking purposes. Supports manual mapping with BlackBone and PastDSE.☆43Apr 23, 2021Updated 4 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Apr 13, 2023Updated 2 years ago