thesecretclub / callout-poc
☆140Updated 4 years ago
Alternatives and similar repositories for callout-poc:
Users that are interested in callout-poc are comparing it to the libraries listed below
- Intercepting DeviceControl via WPP☆131Updated 5 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆120Updated 3 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆105Updated 3 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆138Updated 2 years ago
- manually map driver for a signed driver memory space☆141Updated 3 years ago
- Kernel Lazy Importer☆111Updated 9 months ago
- BattlEye shellcodes tester☆137Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆174Updated last year
- Proof of concept on how to bypass some limitations of a manual mapped driver☆165Updated 4 years ago
- Disks for DMA☆100Updated 3 years ago
- nmi stackwalking + module verification☆101Updated last year
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆193Updated 7 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 2 years ago
- base for testing☆161Updated 3 months ago
- Check your detection vectors☆142Updated last month
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- a minimalistic windows hypervisor for amd processors☆98Updated 2 years ago
- ☆125Updated last month
- A mapper that maps shellcode into loaded large page drivers☆244Updated 2 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆101Updated 2 years ago
- Drawing from kernelmode without any hooks☆161Updated 2 years ago
- A proof of concept demonstrating communication via mapped shared memory structures between a user-mode process and a kernel-mode payload …☆77Updated 3 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆69Updated last year
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆107Updated 2 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆80Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆87Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆68Updated 5 years ago