As i was busy reversing the githubs^^ i stumbled on old source which allows you to control driver kernal^^ with IOCTL, amazing rite?
☆23Jul 15, 2021Updated 4 years ago
Alternatives and similar repositories for Controlling-The-Driver-With-IOCTL
Users that are interested in Controlling-The-Driver-With-IOCTL are comparing it to the libraries listed below
Sorting:
- Hook discord's rendering functions without patching .text.☆14Nov 14, 2021Updated 4 years ago
- communicate with kernel using a image on disk☆16May 1, 2024Updated last year
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆14Nov 8, 2020Updated 5 years ago
- Kernel mode to user mode injector☆11Mar 31, 2020Updated 5 years ago
- Circumvents HWID bans on the rhythm game osu☆12Aug 4, 2019Updated 6 years ago
- i stole this from some guys private repo on github☆58Jul 11, 2021Updated 4 years ago
- ☆13Aug 24, 2022Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- ☆16Feb 5, 2021Updated 5 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- ☆82Aug 17, 2021Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- squad internal simple base☆19Nov 29, 2023Updated 2 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- ☆13Aug 4, 2022Updated 3 years ago
- ☆50Dec 19, 2023Updated 2 years ago
- ☆18Dec 4, 2020Updated 5 years ago
- ☆17Dec 3, 2020Updated 5 years ago
- ☆15Dec 2, 2021Updated 4 years ago
- Fortnite Signatures / Patterns updated every update☆18Jul 12, 2022Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- pepex hack☆10Oct 22, 2021Updated 4 years ago
- ☆27Oct 16, 2017Updated 8 years ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 6 months ago
- External cheat base with DirectX overlay☆20Jul 25, 2018Updated 7 years ago
- ☆18Mar 22, 2022Updated 3 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- ☆10Dec 28, 2023Updated 2 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- handle elevation using bedaisy.☆13Aug 17, 2020Updated 5 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- spoof page-table-entry nx bit☆10Feb 16, 2022Updated 4 years ago
- ☆11Oct 18, 2021Updated 4 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆26Dec 5, 2020Updated 5 years ago
- ☆23Oct 4, 2022Updated 3 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- BypaPH - Process Hacker's bypass (read/write any process virtual memory & kernel mem) 带签名驱动,驱动级内存读取☆23Sep 3, 2020Updated 5 years ago