Plugin for ReClass.Net (using vulnerable driver to read process memory)
☆94Jan 2, 2020Updated 6 years ago
Alternatives and similar repositories for ReClass.NET-DriverReader
Users that are interested in ReClass.NET-DriverReader are comparing it to the libraries listed below
Sorting:
- ☆34Apr 11, 2023Updated 2 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆86Apr 25, 2019Updated 6 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Jan 31, 2020Updated 6 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 2 years ago
- ☆158May 21, 2024Updated last year
- Framework to test any Anti-Cheat☆822Jul 25, 2022Updated 3 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 7 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆24Feb 9, 2024Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆104Jun 26, 2023Updated 2 years ago
- ☆185May 5, 2019Updated 6 years ago
- ☆34Mar 3, 2024Updated 2 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- Cool kernel communication method.☆100Jun 27, 2021Updated 4 years ago
- ☆84Apr 1, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆208Aug 18, 2023Updated 2 years ago
- Rendering on external windows via hijacking thread contexts☆404Jun 28, 2020Updated 5 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated this week
- A mapper that maps shellcode into loaded large page drivers☆329Apr 26, 2022Updated 3 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆393Jul 6, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- ☆19Apr 9, 2024Updated last year
- ☆51Dec 19, 2023Updated 2 years ago
- A method to Disable DSE using .data ptr hooks☆40Feb 1, 2024Updated 2 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆387Jan 29, 2022Updated 4 years ago
- communicate with kernel using a image on disk☆16May 1, 2024Updated last year
- UM-KM Communication using registry callbacks☆39Jun 8, 2020Updated 5 years ago
- ☆156Oct 29, 2019Updated 6 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆220Nov 12, 2020Updated 5 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago