illegal-instruction-co / ThreadInLinks
Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.
☆33Updated last year
Alternatives and similar repositories for ThreadIn
Users that are interested in ThreadIn are comparing it to the libraries listed below
Sorting:
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆96Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- ☆53Updated 2 years ago
- nmi stackwalking + module verification☆129Updated last year
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆23Updated 4 months ago
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆77Updated last year
- An advanced DKOM for drivers with "DRIVER_OBJECT"☆19Updated 2 years ago
- Kernel Level NMI Callback Blocker☆111Updated 11 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆47Updated last year
- ☆78Updated last year
- ☆32Updated 3 years ago
- ☆10Updated 3 years ago
- ntoskrnl .data hooks for UM-KM communication☆50Updated last year
- Translate virtual addresses to physical addresses from usermode.☆41Updated last year
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- Dumping processes using a kernel-mode driver.☆19Updated 3 years ago
- ☆26Updated 8 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆42Updated 9 months ago
- Hiding a system thread against conventional means of detection