notscimmy / libcapcom
Capcom driver exploit wrapper
☆121Updated 5 years ago
Alternatives and similar repositories for libcapcom:
Users that are interested in libcapcom are comparing it to the libraries listed below
- Vectored Exception Handling Hooking Class☆153Updated 6 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆294Updated 6 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- Hooking kernel functions by abusing alignment☆240Updated 4 years ago
- driver mapper / capcom wrapper☆219Updated 5 years ago
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆284Updated 4 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆196Updated 2 years ago
- Internally injected C++ DLL that dumps VFTables with RTTI data, Still In Development☆104Updated last year
- A customizable process dumper.☆138Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 5 years ago
- ☆153Updated 5 years ago
- An Injector that can inject dll into game process protected by anti cheat using SetWindowsHookEx.☆242Updated 5 years ago
- ☆139Updated 4 years ago
- Kernel LdrLoadDll injector☆258Updated 6 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆164Updated 5 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆97Updated 4 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆302Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆86Updated last year
- A library to manipulate physical memory from usermode.☆292Updated last year
- C++17 PE manualmapper☆335Updated 3 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆132Updated 5 months ago
- Disable Driver Callbacks☆102Updated 7 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆127Updated 3 years ago
- ☆164Updated 7 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆115Updated 8 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆168Updated 4 years ago
- A library to read physical memory and system-wide virtual memory.☆125Updated 6 years ago