Two PoC of accessing process virtual memory via NT Kernel
☆22Jun 25, 2021Updated 4 years ago
Alternatives and similar repositories for ProcessVmAccess
Users that are interested in ProcessVmAccess are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆49Jun 3, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- ☆12Jul 12, 2022Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆36Oct 26, 2020Updated 5 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆15Aug 10, 2021Updated 4 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Mar 16, 2026Updated last week
- page table manipulation to gain physical r/w☆44May 7, 2024Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- ☆49Feb 21, 2022Updated 4 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- ☆29Mar 9, 2024Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆20Aug 20, 2023Updated 2 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆106Mar 16, 2026Updated last week
- Using SetWindowHookEx for preinjected DLL's☆57Aug 25, 2022Updated 3 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- Modified version of face injector v2, added some things and alternative injection method. TAGS: fortnite cheat, fortnite injector☆78May 26, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Oct 17, 2018Updated 7 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- An example of Windows NT Native API application and kernel driver☆22Feb 10, 2020Updated 6 years ago
- ☆158May 21, 2024Updated last year
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago