luciouskami / APEX-EACBypassView external linksLinks
APEX-EACBypass(usermode)
☆48Feb 26, 2019Updated 6 years ago
Alternatives and similar repositories for APEX-EACBypass
Users that are interested in APEX-EACBypass are comparing it to the libraries listed below
Sorting:
- ☆67Mar 5, 2019Updated 6 years ago
- hooking KiUserApcDispatcher☆25Apr 3, 2017Updated 8 years ago
- ☆67Oct 8, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- dll转shellcode工具☆104Feb 20, 2020Updated 5 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- ☆185May 5, 2019Updated 6 years ago
- ☆25Mar 3, 2019Updated 6 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- ☆127May 23, 2020Updated 5 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- ☆31Oct 31, 2018Updated 7 years ago
- A tool to dump informations about the caller of a function.☆13Oct 4, 2016Updated 9 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- 玩家不知道战场-超能力感知☆60Mar 21, 2023Updated 2 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 5 years ago
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- ayy debuger☆89Mar 3, 2024Updated last year
- Kernel mode bypass for BattlEye, EAC☆190Oct 25, 2023Updated 2 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- use windows kernel deriver hidden file and itself to Bypass BE☆245Mar 21, 2023Updated 2 years ago