Emulate Drivers in RING3 with self context mapping or unicorn
☆32Dec 31, 2024Updated last year
Alternatives and similar repositories for KACE
Users that are interested in KACE are comparing it to the libraries listed below
Sorting:
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆45Apr 22, 2024Updated last year
- ☆51Aug 29, 2024Updated last year
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆17Apr 30, 2020Updated 5 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- modern c++ wrapper around the microsoft portable executable file format☆36Nov 22, 2025Updated 3 months ago
- (communication detected)a kernel driver for game cheater. includes read&write memory / key&mouse simulator / kernel DWM render / process …☆114May 9, 2025Updated 9 months ago
- an encryption library designed for Windows kernel and driver programming☆123Aug 4, 2023Updated 2 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆21Oct 17, 2025Updated 4 months ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Jan 1, 2025Updated last year
- How to use PiDqSerializationWrite. Introduces how to safely read and write from mapped driver☆26May 29, 2023Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Apr 21, 2023Updated 2 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆26Apr 24, 2022Updated 3 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year
- repeater☆25Aug 25, 2023Updated 2 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆73Oct 29, 2019Updated 6 years ago
- ☆17Jun 30, 2020Updated 5 years ago
- The modifyed cjson that can running on windows kernel☆15Mar 21, 2023Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- ☆13Feb 18, 2021Updated 5 years ago
- Simple C program to quickly deobfuscate windows executables protected with Arxan.☆14Dec 18, 2022Updated 3 years ago
- ☆183May 20, 2022Updated 3 years ago
- ☆193May 1, 2023Updated 2 years ago
- A Simple Example☆23Nov 30, 2018Updated 7 years ago
- ☆13Jul 12, 2025Updated 7 months ago
- NVMe-oF for Windows.☆14Feb 4, 2023Updated 3 years ago
- A minimal CR3 protection PoC (KdpTrap hook)☆15Jan 25, 2025Updated last year
- ☆16Aug 28, 2024Updated last year
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- windows user mode network library☆12Jan 13, 2026Updated last month
- 对debughelp的二次开发☆11Feb 20, 2023Updated 3 years ago
- x86-64 user mode emulation using Zydis☆72Sep 12, 2025Updated 5 months ago
- ☆225Feb 21, 2023Updated 3 years ago
- ☆34Apr 11, 2023Updated 2 years ago
- r/w virtual memory without attach☆218Oct 19, 2023Updated 2 years ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆68Jul 1, 2025Updated 8 months ago
- ☆19May 18, 2023Updated 2 years ago
- ☆18Jan 11, 2026Updated last month