namazso / physmem_drivers
A collection of various vulnerable (mostly physical memory exposing) drivers.
☆319Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for physmem_drivers
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆226Updated 2 years ago
- Bypassing PatchGuard on modern x64 systems☆245Updated last year
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆196Updated 3 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆267Updated last year
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- Debugger Anti-Detection Benchmark☆291Updated 11 months ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆326Updated 3 weeks ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆237Updated 2 years ago
- Load your driver like win32k.sys☆246Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆226Updated 3 years ago
- APC Internals Research Code☆158Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆337Updated 8 months ago
- Elevate a process to be a protected process☆142Updated 5 years ago
- Analyze patches in a process☆247Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆185Updated 2 years ago
- ☆225Updated 2 months ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆196Updated 2 years ago
- Kernel LdrLoadDll injector☆258Updated 6 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆245Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆366Updated 3 years ago
- Memory hacking library powered by AMD SVM☆297Updated last year
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆117Updated 3 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆149Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆123Updated 2 years ago
- ☆153Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆170Updated last year
- DSE bypass using a leaked cert and adjusting the current clock.☆137Updated 2 years ago
- Advanced driver monitoring utility.☆201Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆512Updated 3 weeks ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆549Updated last month