isiddique2024 / Page-Table-InjectorLinks
Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and contextualized address space cloning
☆8Updated this week
Alternatives and similar repositories for Page-Table-Injector
Users that are interested in Page-Table-Injector are comparing it to the libraries listed below
Sorting:
- ☆31Updated 3 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆51Updated last year
- Synchronized Kernel Drawing for 24H2☆15Updated last month
- ☆24Updated 7 months ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆46Updated 4 years ago
- ☆14Updated 3 years ago
- ☆74Updated 2 years ago
- PoC over some VMP features☆23Updated last year
- integrity check in a standalone header.☆7Updated 4 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆29Updated last year
- ☆53Updated 2 years ago
- ☆42Updated 3 years ago
- A simple MmCopyMemory hook.☆38Updated 2 years ago
- Render via steamoverlay externally☆15Updated 2 years ago
- ☆25Updated last year
- A Windows Direct Syscall Library☆43Updated 2 months ago
- Proof of Concept Kernel-User Communication using System Thread.☆15Updated last year
- C/C++ example of InjectMouseInput function☆34Updated 4 years ago
- 将驱动映射到会话空间☆35Updated 2 years ago
- ☆21Updated 2 years ago
- ☆19Updated 4 years ago
- Example driver on how to use SKLib☆52Updated 7 months ago
- Kernel Injector pasted from various different Github repositories.☆18Updated 5 years ago
- ☆46Updated 3 years ago
- ☆83Updated last year
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆53Updated last year
- ☆45Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year