i32-Sudo / NmiCallbackBlocker
Kernel Level NMI Callback Blocker
☆64Updated 5 months ago
Alternatives and similar repositories for NmiCallbackBlocker:
Users that are interested in NmiCallbackBlocker are comparing it to the libraries listed below
- ☆71Updated last year
- ☆50Updated 2 years ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- ☆71Updated 2 years ago
- An Undetected BE Kernel Driver I developed, Will probably be detected upon releasing this but can be made undetected very easily. Does no…☆67Updated 5 months ago
- This is my BE / EAC / VGK DSE Exploit that is used in my Driver Mapper for Valorant & FaceIT (But also works on BE/EAC)☆46Updated 5 months ago
- Discarded Section Manual Map☆67Updated 4 years ago
- A simple ida python script to find .data ptr☆49Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆45Updated 7 months ago
- A simple MmCopyMemory hook.☆35Updated 2 years ago
- Example driver on how to use SKLib☆31Updated 3 months ago
- ☆73Updated 9 months ago
- clearing traces of a loaded driver☆46Updated 2 years ago
- ☆28Updated 4 months ago
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.☆53Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆36Updated 8 months ago
- nmi stackwalking + module verification☆104Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆51Updated 5 months ago
- Driver that communicates using a thread and a shared section with Usermode☆38Updated last week
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆82Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- My Open source cheat driver updated to work on latest EAC versions and draw less detections than the original.☆35Updated 6 months ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- ☆48Updated last year
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- ☆30Updated 2 years ago
- A library to assist with memory & code protection.☆53Updated 11 months ago
- page table manipulation to gain physical r/w☆40Updated 9 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆38Updated 5 months ago