PsSetCreateProcessNotifyRoutine bypass proof-of-concept for manual mapped drivers
☆35Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for notify-routine-poc
Users that are interested in notify-routine-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Register a callback in Kernel from a manually mapped driver☆47Jun 1, 2021Updated 4 years ago
- Proof of concept on how to bypass some limitations of a manual mapped driver☆172Oct 24, 2020Updated 5 years ago
- UAC - Cheat developer platform☆28Oct 29, 2021Updated 4 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Mar 5, 2019Updated 7 years ago
- POC of integrity checks☆14May 31, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- Kernel Context [template c++] Library - K C L. Your stl for work in linux/windows kernel !!!☆11Jul 24, 2018Updated 7 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Oct 6, 2022Updated 3 years ago
- IDT HOOK KiPageFault test Modified from: github.com/kanren3/x64-IDT-HOOK☆18May 2, 2020Updated 5 years ago
- Known ring3 memory protections that can be handled at a simple level.☆67Jan 28, 2023Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 4 years ago
- ☆43Jan 22, 2019Updated 7 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆15Aug 10, 2021Updated 4 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Proof of Concept Kernel-User Communication using System Thread.☆14Sep 24, 2023Updated 2 years ago
- Manual DLL Injector using Thread Hijacking. X64☆37Dec 9, 2018Updated 7 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Hooking the Virtual Method Table using VMT shadow hooking☆27Oct 2, 2020Updated 5 years ago
- ☆38Sep 26, 2024Updated last year
- ☆75Oct 1, 2018Updated 7 years ago
- As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?☆23Jul 15, 2021Updated 4 years ago
- WinPools is an example of how Windows kernel big pool addresses can be leaking using NtQuerySystemInformation☆15Jun 23, 2019Updated 6 years ago
- A library with four different methods to execute shellcode in a process☆26Mar 24, 2020Updated 6 years ago
- Modern x64 anti-debug library☆10Oct 29, 2019Updated 6 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆207May 27, 2021Updated 4 years ago
- Manual mapper that uses PTE manipulation, Virtual Address Descriptor (VAD) manipulation, and forceful memory allocation to hide executabl…☆388Jan 29, 2022Updated 4 years ago
- Convert any binary to a C-style array☆24Aug 24, 2021Updated 4 years ago
- Analysing and defeating PatchGuard universally☆35Nov 4, 2020Updated 5 years ago
- Hiding a system thread against conventional means of detection☆42Oct 7, 2020Updated 5 years ago
- A research project about Windows notify routines.☆38Jul 31, 2020Updated 5 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago