overflowka / PPLProtectionLinks
Protect your process like ntoskrnl.exe
☆17Updated 2 years ago
Alternatives and similar repositories for PPLProtection
Users that are interested in PPLProtection are comparing it to the libraries listed below
Sorting:
- manual map unsigned driver over signed memory☆201Updated last year
- Use RTCore64 to map your driver on windows 11.☆129Updated 3 months ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆134Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆173Updated last year
- A slimmed-down, modified kd-mapper for game cheat development this repository removes unnecessary code, increases the reliability. It loa…☆17Updated 2 weeks ago
- Spoof the return address of any function call.☆11Updated last year
- Simple Kernelmode DLL Injector with Manual mapping☆310Updated last year
- browse microsoft driver server for potentially vulnerable drivers☆22Updated last year
- Windows Kernel inject (no module no thread)☆278Updated 2 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆184Updated 2 years ago
- Abusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.☆274Updated 2 years ago
- State of the art DLL injector that took 20 minutes to make☆220Updated 2 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆147Updated 11 months ago
- ☆317Updated 3 months ago
- DSE & PG bypass via BYOVD attack☆59Updated last month
- ☆124Updated last year
- load unsigned kernel-driver by patching dse in 248 lines☆130Updated last year
- ☆79Updated last year
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆156Updated last year
- IoCreateDriver Implementation, it can be handful if you're trying to bypass anticheats☆98Updated 3 months ago
- An advanced and low-level c++ x64 Windows usermode debugging detector, able to bypass any usermode debugger-hide tool☆20Updated last year
- ☆155Updated last year
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆113Updated 2 years ago
- ☆189Updated 3 years ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆218Updated 4 months ago
- Crashes ida on static analyses.☆105Updated 4 months ago
- Using CVE-2023-21768 to manual map kernel mode driver☆192Updated 2 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆72Updated last year
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆166Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year