hypervisor / PatternScanner
C tool to scan for a pattern in a file.
☆8Updated 4 years ago
Alternatives and similar repositories for PatternScanner:
Users that are interested in PatternScanner are comparing it to the libraries listed below
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Updated 3 years ago
- advanced C/C++ antidebugging library for Windows☆14Updated last week
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆39Updated 6 years ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- ollvm 4.0 using clang 10.0.1☆13Updated 3 years ago
- ☆17Updated 4 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆16Updated 2 years ago
- NT reversal☆26Updated 6 years ago
- Using SetWindowHookEx for preinjected DLL's☆56Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- x64 Windows privilege elevation using anycall☆20Updated 3 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆49Updated 5 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆42Updated last year
- Process hiding library☆19Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- ☆29Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆25Updated last year
- Simple driver loader for windows☆18Updated 4 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆23Updated 3 years ago
- ☆23Updated 10 months ago