Detect manualmapped images remotely, without hassle
☆152Nov 3, 2017Updated 8 years ago
Alternatives and similar repositories for MapDetection
Users that are interested in MapDetection are comparing it to the libraries listed below
Sorting:
- C++17 PE manualmapper☆436Oct 2, 2021Updated 4 years ago
- ☆185May 5, 2019Updated 6 years ago
- NT reversal☆25Jul 12, 2018Updated 7 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 6 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 6 years ago
- Module extending manual mapper☆380Mar 28, 2020Updated 5 years ago
- A customizable process dumper.☆144Jul 5, 2019Updated 6 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Nov 7, 2019Updated 6 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆418Jan 3, 2020Updated 6 years ago
- Code injection via delay load libraries☆36Sep 20, 2017Updated 8 years ago
- A small wrapper class providing an unified interface to search for various memory signatures☆79Feb 2, 2022Updated 4 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆76Jun 25, 2020Updated 5 years ago
- x64 usermode rootkit☆211Apr 11, 2018Updated 7 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- DLL scatter manual mapper☆811Apr 10, 2021Updated 4 years ago
- Handle access elevation via direct kernel object manipulation☆118Jan 26, 2018Updated 8 years ago
- Just my first IOCTL try☆75Jul 9, 2020Updated 5 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆240Nov 6, 2019Updated 6 years ago
- Manual mapping without creating any threads, with rw only access☆805Oct 29, 2019Updated 6 years ago
- This is a collection of interesting codes about Windows Process creation.☆237Jan 12, 2024Updated 2 years ago
- A modern c++ implementation of windows heavens gate☆245Sep 19, 2020Updated 5 years ago
- Bypass User Account Control by manipulating tokens☆35Nov 3, 2017Updated 8 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Mar 8, 2020Updated 5 years ago
- ☆41Aug 3, 2019Updated 6 years ago
- My take on the capcom driver vulnerability☆28Aug 7, 2017Updated 8 years ago
- Disable Driver Callbacks☆104Oct 16, 2017Updated 8 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆228Nov 24, 2017Updated 8 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆902Nov 21, 2019Updated 6 years ago
- HIDInput is a device driver that emulates mouse and/or keyboard input, and has been supplemented with easy to use functions that aid in t…☆261Jul 30, 2021Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Windows driver for spoofing serial number of HDDs☆221Sep 8, 2022Updated 3 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆38Aug 18, 2018Updated 7 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- driver manual mapper (outdated/for educational purposes)☆115May 17, 2019Updated 6 years ago