Bypasses for Windows kernel callbacks PatchGuard protection
☆44Aug 15, 2021Updated 4 years ago
Alternatives and similar repositories for kernel_callbacks
Users that are interested in kernel_callbacks are comparing it to the libraries listed below
Sorting:
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆36Oct 26, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- ☆158May 21, 2024Updated last year
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- c++ implementation of windows heavens gate☆71Feb 12, 2021Updated 5 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Apr 20, 2021Updated 4 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆49Jun 3, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- Some garbage drivers written for getting started☆65Dec 31, 2019Updated 6 years ago
- ☆14Mar 8, 2019Updated 7 years ago
- Windows Server 2K3 NT 5☆12Apr 17, 2021Updated 4 years ago
- ☆10Oct 3, 2016Updated 9 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Sep 12, 2022Updated 3 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- Global DLL injector☆71May 16, 2021Updated 4 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers☆35Jul 19, 2021Updated 4 years ago
- Exploit MsIo vulnerable driver☆129Aug 12, 2021Updated 4 years ago
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆182Aug 26, 2022Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- by others☆40Jan 28, 2018Updated 8 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Oct 6, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago