namazso / physmem_drivers
A collection of various vulnerable (mostly physical memory exposing) drivers.
☆347Updated 2 years ago
Alternatives and similar repositories for physmem_drivers:
Users that are interested in physmem_drivers are comparing it to the libraries listed below
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆273Updated last year
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆343Updated 3 months ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆265Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 3 years ago
- Bypassing PatchGuard on modern x64 systems☆252Updated last year
- Browse Page Tables on Windows (Page Table Viewer)☆193Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆269Updated 4 months ago
- Debugger Anti-Detection Benchmark☆305Updated last year
- APC Internals Research Code☆161Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆228Updated 3 years ago
- Load your driver like win32k.sys☆252Updated 2 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆199Updated 2 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆389Updated 3 years ago
- ☆153Updated 5 years ago
- A mapper that maps shellcode into loaded large page drivers☆252Updated 2 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆307Updated 3 years ago
- Voyager - A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆255Updated last year
- ☆256Updated last month
- A more stealthy variant of "DLL hollowing"☆335Updated 11 months ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆237Updated 10 months ago
- Kernel LdrLoadDll injector☆258Updated 6 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆289Updated 6 years ago
- Analyze patches in a process☆249Updated 3 years ago
- Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module☆415Updated 6 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆135Updated 2 years ago
- UEFI bootkit for driver manual mapping☆532Updated last year
- Advanced driver monitoring utility.☆203Updated 2 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆575Updated 3 weeks ago