killvxk / DisableWin10PatchguardPocLinks
pseudo-code to show how to disable patchguard with win10
☆295Updated 7 years ago
Alternatives and similar repositories for DisableWin10PatchguardPoc
Users that are interested in DisableWin10PatchguardPoc are comparing it to the libraries listed below
Sorting:
- Hide Driver By MiProcessLoaderEntry☆292Updated 6 years ago
- PatchGuard Research☆304Updated 7 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆436Updated 3 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆440Updated 5 years ago
- Hide codes/data in the kernel address space.☆187Updated 4 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆194Updated 9 years ago
- ☆160Updated 5 years ago
- hook msr by amd svm☆124Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆115Updated 8 years ago
- Windows Ark 工具的工程和一些demo☆193Updated 9 years ago
- ☆115Updated 6 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆266Updated 9 months ago
- LLVM Obfuscator / constexpr / PEB CALL API☆180Updated 6 years ago
- open-source x86/x64 usermode anti-anti-debug plugin☆228Updated 5 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- System call hook for Windows 10 20H1☆494Updated 4 years ago
- modify from memorymodule. support exception☆220Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆224Updated 7 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆129Updated 8 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆441Updated 4 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆152Updated 6 years ago
- ☆125Updated 5 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Updated 7 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- Simple Intel VT-x hypervisor☆339Updated last year
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆746Updated 8 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆532Updated 6 years ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆533Updated 3 years ago
- A hypervisor hiding user-mode memory using EPT☆108Updated 7 years ago
- InfinityHookPro Win7 -> Win11 latest☆545Updated 2 years ago