killvxk / DisableWin10PatchguardPocLinks
pseudo-code to show how to disable patchguard with win10
☆296Updated 7 years ago
Alternatives and similar repositories for DisableWin10PatchguardPoc
Users that are interested in DisableWin10PatchguardPoc are comparing it to the libraries listed below
Sorting:
- Hide Driver By MiProcessLoaderEntry☆288Updated 6 years ago
- PatchGuard Research☆302Updated 6 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆430Updated 3 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆192Updated 8 years ago
- ☆161Updated 4 years ago
- Hide codes/data in the kernel address space.☆189Updated 4 years ago
- open-source x86/x64 usermode anti-anti-debug plugin☆226Updated 5 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆440Updated 4 years ago
- ☆113Updated 5 years ago
- hook msr by amd svm☆122Updated 5 years ago
- Windows Ark 工具的工程和一些demo☆191Updated 9 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆182Updated 6 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆251Updated 6 months ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆421Updated 4 years ago
- An Ark tool project,run on Win7 x86/x64☆114Updated 8 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆525Updated 6 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆127Updated 7 years ago
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- Simple Intel VT-x hypervisor☆327Updated last year
- This DKOM exploit enables any app in usermode to access physical memory directly☆225Updated 7 years ago
- modify from memorymodule. support exception☆219Updated 4 years ago
- Detecting execution of kernel memory where is not backed by any image file☆260Updated 7 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆151Updated 6 years ago
- ☆125Updated 5 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆744Updated 8 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 3 years ago
- driver mapper / capcom wrapper☆221Updated 5 years ago
- VMProtect 3.x Anti-debug Method Improved☆607Updated 6 years ago
- A hypervisor hiding user-mode memory using EPT☆109Updated 7 years ago