isiddique2024 / Page-Table-InjectorLinks
Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and contextualized address space cloning
☆74Updated 3 months ago
Alternatives and similar repositories for Page-Table-Injector
Users that are interested in Page-Table-Injector are comparing it to the libraries listed below
Sorting:
- Example driver on how to use SKLib☆65Updated last year
- A simple ida python script to find .data ptr☆56Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆99Updated 2 years ago
- ☆63Updated 3 years ago
- DWM overlay without pattern scanning☆60Updated last month
- POC usermode <=> kernel communication via ALPC.☆66Updated last year
- ☆85Updated 2 years ago
- ☆62Updated 3 years ago
- ☆72Updated 3 years ago
- ☆147Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆55Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆77Updated 2 years ago
- ☆35Updated 3 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆83Updated 3 months ago
- A library to assist with memory & code protection.☆65Updated last year
- ☆84Updated last year
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆61Updated 2 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆34Updated 2 years ago
- ☆63Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Updated 3 years ago
- ☆70Updated 4 years ago
- Discarded Section Manual Map☆68Updated 5 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆77Updated 3 years ago
- ☆144Updated 3 years ago
- base for testing☆180Updated last year
- i stole this from some guys private repo on github☆58Updated 4 years ago
- Calling "own" MouseClassServiceCallback☆73Updated 3 years ago
- Kernel driver that moves the mouse☆74Updated 9 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆66Updated 3 months ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Updated 3 years ago