☆156Oct 29, 2019Updated 6 years ago
Alternatives and similar repositories for driver-hijack
Users that are interested in driver-hijack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Nov 24, 2017Updated 8 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Jan 7, 2020Updated 6 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Experiment to use sections as User/Kernelmode comm vector☆22Apr 7, 2023Updated 3 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆122Mar 30, 2018Updated 8 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆392Jul 6, 2022Updated 3 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- Literally, the perfect injector.☆982Apr 13, 2023Updated 3 years ago
- This tiny project prevents the signtool from verifing cert time validity and let you sign your bin with outdated cert without changing sy…☆238Dec 14, 2018Updated 7 years ago
- ☆27May 27, 2017Updated 8 years ago
- A library to read physical memory and system-wide virtual memory.☆129May 3, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆683Nov 9, 2023Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆160Mar 16, 2026Updated last month
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 8 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Spoof Windows Test Signing Mode☆29Oct 13, 2018Updated 7 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- createfile☆50Oct 27, 2015Updated 10 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆103Jun 26, 2023Updated 2 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆95Jan 2, 2020Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 11 years ago
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆221Nov 12, 2020Updated 5 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆538Jun 28, 2019Updated 6 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 8 years ago
- Module extending manual mapper☆381Mar 28, 2020Updated 6 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hide codes/data in the kernel address space.☆187May 8, 2021Updated 4 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆382Mar 15, 2024Updated 2 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- Hypervisor based tool for monitoring system register accesses.☆156Sep 13, 2018Updated 7 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆243Jul 7, 2021Updated 4 years ago
- Hooking kernel functions by abusing alignment☆250Jan 5, 2021Updated 5 years ago