ninetails0 / Kernel-Driver-Read-Write-Memory-GDI-OverlayLinks
Driver hooks a function from NT windows. read/write memory and use windows GDI to draw on buffer from kernel.
☆36Updated 4 years ago
Alternatives and similar repositories for Kernel-Driver-Read-Write-Memory-GDI-Overlay
Users that are interested in Kernel-Driver-Read-Write-Memory-GDI-Overlay are comparing it to the libraries listed below
Sorting:
- ☆62Updated 3 years ago
- ☆48Updated 3 years ago
- Windows Kernel Misc☆23Updated 2 years ago
- ☆48Updated 3 years ago
- ☆69Updated 3 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆53Updated last year
- ☆49Updated 4 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆51Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆97Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- ☆23Updated 3 years ago
- 将驱动映射到会话空间☆36Updated 3 years ago
- Made by scammer so i leak for free ! have fun☆55Updated 2 years ago
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- I've developed a rather effective driver for DLL injection targeting EAC Protected Games, and since i dont care for any notable games uti…☆95Updated last year
- https://githacks.org/Shawick/goodeye.git☆51Updated 5 years ago
- Top level overlay drawing for game cheating using dwm.exe☆46Updated 4 years ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆76Updated 3 years ago
- page table manipulation to gain physical r/w☆42Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆104Updated 2 years ago
- ☆42Updated 3 years ago
- POC usermode <=> kernel communication via ALPC.☆64Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆52Updated last year
- Only for Stress-Testing☆26Updated 3 years ago
- A library to assist with memory & code protection.☆64Updated last year
- ☆22Updated 3 years ago