Capcom driver exploit wrapper
☆131May 24, 2019Updated 6 years ago
Alternatives and similar repositories for libcapcom
Users that are interested in libcapcom are comparing it to the libraries listed below
Sorting:
- Handle elevation DKOM against ObRegisterCallbacks☆344Sep 20, 2018Updated 7 years ago
- Elevate a process to be a protected process☆156Sep 5, 2019Updated 6 years ago
- Capcom wrapper with safety in mind.☆83May 27, 2018Updated 7 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Sep 14, 2020Updated 5 years ago
- Analysing and defeating PatchGuard universally☆36Nov 4, 2020Updated 5 years ago
- ☆31Oct 31, 2018Updated 7 years ago
- A simple MmCopyMemory hook.☆38Jul 11, 2022Updated 3 years ago
- Yet Another Sig Scanner☆34Jul 18, 2018Updated 7 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated 3 weeks ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆905Nov 21, 2019Updated 6 years ago
- driver manual mapper (outdated/for educational purposes)☆115May 17, 2019Updated 6 years ago
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆821Sep 7, 2020Updated 5 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Nov 24, 2017Updated 8 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- A library to read physical memory and system-wide virtual memory.☆129May 3, 2018Updated 7 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Reversing EasyAntiCheat.☆586Apr 19, 2019Updated 6 years ago
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Aug 14, 2018Updated 7 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- Decrement Windows Kernel for fun and profit☆39Jan 29, 2018Updated 8 years ago
- ☆156Oct 29, 2019Updated 6 years ago
- disable most common windowsx64 systems patchguard☆87Dec 29, 2018Updated 7 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Aug 29, 2018Updated 7 years ago
- Minimalistic VT-x hypervisor with hooks☆935Oct 18, 2019Updated 6 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- New handle stealing technique for windows apps☆14Oct 6, 2017Updated 8 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆120Mar 30, 2018Updated 7 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Literally, the perfect injector.☆978Apr 13, 2023Updated 2 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- A library to manipulate physical memory from usermode.☆303Sep 5, 2023Updated 2 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago