li4321 / GhostInjector
☆29Updated 2 months ago
Related projects: ⓘ
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆38Updated 3 months ago
- ntoskrnl .data hooks for UM-KM communication☆33Updated 3 months ago
- ☆33Updated this week
- Experiment with PAGE_GUARD protection to hide memory from other processes☆31Updated 2 months ago
- PoC kernel to usermode injection☆48Updated 6 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆29Updated 5 months ago
- codecave hook reverse engineering toolkit.☆31Updated 9 months ago
- ☆51Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆39Updated last year
- DSE & PG bypass via BYOVD attack☆34Updated 5 months ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆27Updated 2 months ago
- Compileable POC of namazso's x64 return address spoofer.☆46Updated 4 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated 10 months ago
- spoof return address☆68Updated last year
- Tool to dump EFI runtime drivers.☆31Updated 6 months ago
- Simple PE Explorer That List All The Sections and Adresses☆11Updated 7 months ago
- windows rootkit☆50Updated 4 months ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆24Updated 2 years ago
- ☆33Updated this week
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆44Updated last year
- A simple tool to assemble shellcode ready to be copy-pasted into code☆63Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆100Updated last year
- ☆63Updated 4 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆30Updated 3 weeks ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆58Updated last year
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- manual map unsigned driver over signed memory☆152Updated 5 months ago
- Makes IDA (most versions) to crash upon opening it.☆52Updated 3 weeks ago
- The sequel to Voyager☆9Updated 3 weeks ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆9Updated 2 years ago