kkent030315 / EvilHooker
Function hooks in Windows NT Kernel
☆21Updated 4 years ago
Alternatives and similar repositories for EvilHooker:
Users that are interested in EvilHooker are comparing it to the libraries listed below
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆28Updated 2 years ago
- Disk based DMA for ATA and SCSI☆18Updated last year
- Driver that communicates using a thread and a shared section with Usermode☆38Updated last week
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆35Updated 4 months ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆40Updated 6 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Updated 3 years ago
- Simplifies the Windows Kernel APIs by making the existing function easier to use, and extends them by creating functions that could possi…☆26Updated 6 months ago
- Elevate arbitrary MSR writes to kernel execution.☆26Updated last year
- ASUSTeK AsIO3 I/O driver unlock☆20Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Memory Guard Library☆11Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆42Updated last year
- a dumb rpm/wpm example driver☆14Updated 3 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆40Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆41Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆38Updated 5 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆28Updated 4 months ago
- ☆15Updated 4 years ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆51Updated 2 years ago
- A Simple Example☆21Updated 6 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆64Updated last year
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- The sequel to Voyager☆36Updated 6 months ago
- A slightly safer io access library☆13Updated 3 years ago
- a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification☆11Updated 11 months ago