A few examples of how to trap virtual memory access on Windows.
☆41Dec 18, 2024Updated last year
Alternatives and similar repositories for windows-memory-access-traps
Users that are interested in windows-memory-access-traps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- System Call Integrity Layer - experimental security research☆26Apr 14, 2026Updated 3 weeks ago
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆87Oct 18, 2024Updated last year
- Zero-dependency MCP server implementation.☆75Mar 27, 2026Updated last month
- My public talks☆14Oct 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Dynamically invoke arbitrary code in Rust☆105Mar 16, 2026Updated last month
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- idax: IDASDK extension libraries☆24Oct 12, 2025Updated 6 months ago
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆37Oct 30, 2024Updated last year
- Simple example for getting started with eBPF for Windows☆51Feb 23, 2025Updated last year
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆440Jun 27, 2025Updated 10 months ago
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated 2 years ago
- Simple yara decompiler☆17Apr 8, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆198Jul 29, 2024Updated last year
- really ?☆12Feb 29, 2024Updated 2 years ago
- Compile-time string crypter library for C++☆13May 7, 2021Updated 4 years ago
- ☆20Nov 8, 2020Updated 5 years ago
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆145Mar 16, 2024Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123May 29, 2024Updated last year
- ☆102Oct 7, 2023Updated 2 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago
- "Service-less" driver loading☆186Nov 28, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆22Jul 6, 2023Updated 2 years ago
- Test AMSI Provider implementation in C#☆45Dec 18, 2024Updated last year
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 3 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Mentally ill EtwTi parser☆70Jan 11, 2026Updated 3 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆111Mar 25, 2024Updated 2 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 4 months ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆74Apr 13, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Ghidra extension for running Kotlin scripts☆16May 21, 2020Updated 5 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆17Jan 7, 2021Updated 5 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆52Dec 22, 2025Updated 4 months ago
- Sleep obfuscation☆274Dec 13, 2024Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆274Oct 31, 2024Updated last year
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated 2 months ago
- ☆32Dec 5, 2024Updated last year