kkent030315 / libmhyprotLinks
A static library, wrapper for mhyprot vulnerable driver, execute exploits and tests
☆131Updated 4 years ago
Alternatives and similar repositories for libmhyprot
Users that are interested in libmhyprot are comparing it to the libraries listed below
Sorting:
- A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.☆339Updated 4 years ago
- A PoC for vulnerable driver "mhyprot" that allows us to read/write memory in kernel/user from usermode.☆162Updated 5 years ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆127Updated 4 years ago
- Kernel driver loader using vulnerable gigabyte driver (https://www.secureauth.com/labs/advisories/gigabyte-drivers-elevation-privilege-vu…☆262Updated 4 years ago
- BattlEye kernel module bypass☆173Updated 3 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆217Updated 4 years ago
- Reverse engineering Genshin Impact anticheat to study how anticheats work on the Windows operating system.☆103Updated 3 years ago
- Linux kernel module for memflow's KVM connector☆45Updated 9 months ago
- Windows Kernel inject (no module no thread)☆279Updated 2 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆175Updated last year
- Easy Anti PatchGuard☆221Updated 4 years ago
- Using CVE-2023-21768 to manual map kernel mode driver☆193Updated 2 years ago
- ☆45Updated 4 years ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆185Updated last month
- Known ring3 memory protections that can be handled at a simple level.☆67Updated 2 years ago
- Capcom driver exploit wrapper☆126Updated 6 years ago
- ☆188Updated 3 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆359Updated 3 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆137Updated last year
- SetWindowsHookEx Injector☆174Updated 2 years ago
- Drawing from kernelmode without any hooks☆172Updated 3 years ago
- ☆216Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆164Updated 3 years ago
- ☆145Updated 2 months ago
- Manual DLL Injector using Thread Hijacking. X64☆36Updated 6 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆241Updated 6 years ago
- 利用CE的DBK驱动加载未签名驱动☆38Updated 2 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆204Updated 4 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆188Updated 2 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆173Updated 3 years ago