thebowenfeng / task-manager-hiderLinks
☆43Updated 3 years ago
Alternatives and similar repositories for task-manager-hider
Users that are interested in task-manager-hider are comparing it to the libraries listed below
Sorting:
- Detects virtual machines and malware analysis environments☆139Updated 3 years ago
- UEFI Bootkit with user-mode communication☆107Updated 4 months ago
- State of the art DLL injector that took 20 minutes to make☆221Updated 2 years ago
- manual map unsigned driver over signed memory☆205Updated last year
- Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads☆221Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆22Updated 3 years ago
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆13Updated last year
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆132Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- ☆157Updated last year
- UEFI Bootkit Framework that attacks boot-time Code Integrity☆91Updated 2 weeks ago
- ☆132Updated 3 years ago
- ☆61Updated 2 years ago
- load unsigned kernel-driver by patching dse in 248 lines☆135Updated last year
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆170Updated last month
- kernel mode spoofer disk and smbios, socket communication☆217Updated 2 years ago
- A Dynamic Study Vmprotect 1.x-1.9X Unpacking Toolkit, Recovery OEP, FIX PE, IAT and bypass protection with custom Loader and interceptor …☆34Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago
- Based on physmeme☆70Updated 3 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆177Updated last year
- A manual PE mapping implementation, aka reflective loader☆19Updated 3 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆111Updated 2 years ago
- A customizable process dumper.☆143Updated 6 years ago
- Various Process Injection Techniques☆159Updated 3 years ago
- DSE & PG bypass via BYOVD attack☆66Updated 3 months ago
- Hide a loaded dynamic link library from memory☆34Updated 4 years ago
- a always updated and undetected temp spoof driver☆27Updated 7 months ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆65Updated 2 years ago