killvxk / DisableWin10PatchguardPocLinks
pseudo-code to show how to disable patchguard with win10
☆295Updated 8 years ago
Alternatives and similar repositories for DisableWin10PatchguardPoc
Users that are interested in DisableWin10PatchguardPoc are comparing it to the libraries listed below
Sorting:
- Hide Driver By MiProcessLoaderEntry☆292Updated 6 years ago
- PatchGuard Research☆303Updated 7 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆442Updated 4 years ago
- Windows Ark 工具的工程和一些demo☆193Updated 9 years ago
- Hide codes/data in the kernel address space.☆188Updated 4 years ago
- ☆163Updated 5 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆443Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆118Updated 8 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆180Updated 6 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆197Updated 9 years ago
- hook msr by amd svm☆125Updated 6 years ago
- ☆116Updated 6 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Updated 8 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆455Updated 4 years ago
- open-source x86/x64 usermode anti-anti-debug plugin☆230Updated 5 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆270Updated 11 months ago
- Collect different versions of Crucial modules.☆144Updated last year
- System call hook for Windows 10 20H1☆495Updated 4 years ago
- windows泄露源码☆253Updated 12 years ago
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- modify from memorymodule. support exception☆222Updated 5 years ago
- Simple Intel VT-x hypervisor☆353Updated 2 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆535Updated 6 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆747Updated 8 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Updated 7 years ago
- ☆127Updated 5 years ago
- 之前那份是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆153Updated 6 years ago
- ☆176Updated last year
- A hypervisor hiding user-mode memory using EPT☆107Updated 7 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Updated 8 years ago