isoadam / gina_publicView external linksLinks
Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections
☆55Mar 30, 2019Updated 6 years ago
Alternatives and similar repositories for gina_public
Users that are interested in gina_public are comparing it to the libraries listed below
Sorting:
- simply manual map any system image☆18Feb 1, 2021Updated 5 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆88Apr 25, 2019Updated 6 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 6 years ago
- ☆31Oct 31, 2018Updated 7 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Jul 1, 2019Updated 6 years ago
- ☆35Jun 13, 2020Updated 5 years ago
- Kernel Hook X64☆26Oct 11, 2020Updated 5 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Oct 4, 2018Updated 7 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆38Dec 10, 2018Updated 7 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- ☆17Feb 29, 2020Updated 5 years ago
- ☆127May 23, 2020Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- ☆185May 5, 2019Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 6 years ago
- driver manual mapper (outdated/for educational purposes)☆114May 17, 2019Updated 6 years ago
- driver interface with dll-injection capabilities☆28Nov 5, 2020Updated 5 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- A small bypass for BattlEye's integrity checks on all mono games. This should be used as POC and as a learning material only.☆13Apr 25, 2020Updated 5 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago