huoji120 / GpuzMaperView external linksLinks
using gpuz to load driver
☆36Mar 14, 2019Updated 6 years ago
Alternatives and similar repositories for GpuzMaper
Users that are interested in GpuzMaper are comparing it to the libraries listed below
Sorting:
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated 11 months ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- C/C++ example of InjectMouseInput function☆35Apr 17, 2021Updated 4 years ago
- If you made it in here I have no clue how, well hi☆13Apr 10, 2022Updated 3 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- Win32 API Hook偵測☆10Oct 1, 2017Updated 8 years ago
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- A file system filter, you can do some interesting thing, maybe it's cool.☆55Feb 15, 2019Updated 7 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- Detect the SCI in windows.☆11Mar 23, 2017Updated 8 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Jan 15, 2014Updated 12 years ago
- POC of sysenter x64 LSTAR MSR hook☆41Jul 20, 2014Updated 11 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆20Oct 1, 2015Updated 10 years ago
- Call Of Duty Cold War zombies trainer☆15Feb 25, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Global DLL injector☆71May 16, 2021Updated 4 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- ☆28Nov 20, 2017Updated 8 years ago
- ☆27Apr 4, 2019Updated 6 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- Intel-VT-x/Hook Msr Build and Replace System Server Description Table.☆17Mar 14, 2025Updated 11 months ago
- Intel Virtualization Technology demo☆73Oct 15, 2016Updated 9 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- ayy debuger☆89Mar 3, 2024Updated last year
- ☆68Dec 17, 2020Updated 5 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago