r0akmap is a PoC driver manual mapper based on r0ak
☆38Aug 18, 2018Updated 7 years ago
Alternatives and similar repositories for r0akmap
Users that are interested in r0akmap are comparing it to the libraries listed below
Sorting:
- ☆31Oct 31, 2018Updated 7 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- Capcom wrapper with safety in mind.☆83May 27, 2018Updated 7 years ago
- .lib file for linking against the NT CRT☆19Mar 18, 2022Updated 3 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Oct 4, 2018Updated 7 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆60Sep 14, 2020Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- LDE64 (relocatable) source code☆103Jun 24, 2015Updated 10 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Windows driver for spoofing serial number of HDDs☆222Sep 8, 2022Updated 3 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Jan 23, 2018Updated 8 years ago
- A small bypass for BattlEye's integrity checks on all mono games. This should be used as POC and as a learning material only.☆13Apr 25, 2020Updated 5 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- KVM-based memory access recorder☆20Oct 14, 2018Updated 7 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Wow64 syscall hook☆43May 28, 2017Updated 8 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Dec 23, 2010Updated 15 years ago
- ☆13Aug 24, 2022Updated 3 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- ☆15Mar 13, 2023Updated 2 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆15Feb 22, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/bypass-x64-dse☆21Oct 1, 2015Updated 10 years ago
- ☆14Jun 27, 2017Updated 8 years ago
- UEFI Hypervisor☆21Feb 1, 2016Updated 10 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Jan 15, 2021Updated 5 years ago
- A library to read physical memory and system-wide virtual memory.☆128May 3, 2018Updated 7 years ago