A few examples of how to trap virtual memory access on Windows.
☆41Dec 18, 2024Updated last year
Alternatives and similar repositories for windows-memory-access-traps
Users that are interested in windows-memory-access-traps are comparing it to the libraries listed below
Sorting:
- A synergized Visual Studio and Rust development environment☆19Jan 25, 2025Updated last year
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- My public talks☆14Oct 1, 2024Updated last year
- Dynamically invoke arbitrary code in Rust (Dinvoke)☆101Dec 1, 2025Updated 3 months ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- ☆20Nov 8, 2020Updated 5 years ago
- Zero-dependency MCP server implementation.☆61Feb 23, 2026Updated last week
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Simple example for getting started with eBPF for Windows☆50Feb 23, 2025Updated last year
- Mentally ill EtwTi parser☆68Jan 11, 2026Updated last month
- ☆101Oct 7, 2023Updated 2 years ago
- WinDbg plugin to trace module transitions from a debugged driver.☆40Dec 22, 2025Updated 2 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆436Jun 27, 2025Updated 8 months ago
- Shellcode capable of bypassing EAF / IAF mitigations☆28Apr 11, 2023Updated 2 years ago
- ☆194Jul 29, 2024Updated last year
- T-1 is a shellcode loader that leverages ML techniques to detect VM environments☆34Oct 30, 2024Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆110Mar 25, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- MuddyWater C2 framework research☆12Jun 28, 2023Updated 2 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 7 months ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆25Jan 27, 2025Updated last year
- ☆10Apr 13, 2021Updated 4 years ago
- Sleep obfuscation☆268Dec 13, 2024Updated last year
- Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)☆144Mar 16, 2024Updated last year
- Sample Rust crate used to implement a VBS enclave in Rust☆44Jun 3, 2025Updated 9 months ago
- Admin to Kernel code execution using the KSecDD driver☆265Apr 19, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆85Oct 18, 2024Updated last year
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆122May 29, 2024Updated last year
- idax: IDASDK extension libraries☆22Oct 12, 2025Updated 4 months ago
- really ?☆12Feb 29, 2024Updated 2 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 3 weeks ago
- use python on windows with full submodule support without installation☆30Jan 23, 2025Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆67Feb 11, 2025Updated last year