niemand-sec / Reversing-XignCode3-Driver
I'm going to be dropping code from the XC3 Driver (result of reversing the driver)
☆67Updated 5 years ago
Alternatives and similar repositories for Reversing-XignCode3-Driver:
Users that are interested in Reversing-XignCode3-Driver are comparing it to the libraries listed below
- ☆64Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆54Updated 5 years ago
- BattlEye Emulator, modified from slicktors work.☆13Updated 6 years ago
- Disable Driver Callbacks☆102Updated 7 years ago
- ☆24Updated 6 years ago
- ☆94Updated 7 years ago
- ☆43Updated 6 years ago
- BattlEye x64 usermode injector☆64Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Manual PE image mapper☆62Updated 11 years ago
- ☆47Updated 3 years ago
- Intercepting DeviceControl via WPP☆132Updated 5 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆91Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- x64 syscall caller in C++.☆86Updated 6 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- ☆67Updated 4 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆66Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 2 years ago
- VMP Mutation API Fix☆40Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆68Updated 2 years ago
- Using DKOM to hide kernel mode drivers☆55Updated 7 years ago
- A simple ida python script to find .data ptr☆48Updated last year
- Hooking SSDT with Avast Internet Security Hypervisor☆113Updated 5 years ago
- x64 manual mapper using inline syscalls☆7Updated 3 years ago
- mouseclassservicecallback detection via hook☆49Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago