opcode86 / SysCaller
Single header library to simplify the usage of direct syscalls. x64/x86
☆11Updated last year
Alternatives and similar repositories for SysCaller:
Users that are interested in SysCaller are comparing it to the libraries listed below
- ☆14Updated 4 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- ☆23Updated last year
- a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification☆11Updated 10 months ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆12Updated 9 months ago
- ☆32Updated last year
- Stealing signatures from pe files☆16Updated 2 years ago
- ☆25Updated 2 years ago
- Written in a couple hours, don't judge :)☆14Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆28Updated 2 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆30Updated 3 months ago
- Injector with kernel power☆16Updated 4 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- Not mine, just saved☆12Updated last year
- RWX Section Abusing☆18Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 4 months ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- An example code of CiGetCertPublisherName☆14Updated 2 years ago
- Disable threat tracing from the kernel..☆12Updated 2 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆16Updated 2 years ago
- ☆36Updated last year
- ☆13Updated 2 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- ☆15Updated 2 years ago
- A simple way to spoof return addresses using an exception handler☆31Updated 2 years ago