za233 / NeacControllerLinks
Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution
☆21Updated last month
Alternatives and similar repositories for NeacController
Users that are interested in NeacController are comparing it to the libraries listed below
Sorting:
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆113Updated last month
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 5 months ago
- Enum and Remove Hook in Windows☆39Updated 2 weeks ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Updated 10 months ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- ☆124Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆128Updated 7 months ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- 一个用来做windows内核hook的框架☆173Updated 3 months ago
- 大部分常见windows内核文件合集 下方链接里有更多更全面的☆14Updated last year
- 一个windows内核驱动分析框架,对内核所有导出函数进行挂钩监控☆58Updated 3 months ago
- A library to assist with memory & code protection.☆60Updated last year
- 收集常用windows版本内核文件☆34Updated last year
- IDA Pro plugin AntiXorstr☆141Updated 5 months ago
- PoC kernel to usermode injection☆86Updated last year
- abusing signed pdfwkrnl.sys for kernel function calling from usermode.☆18Updated 2 months ago
- ☆12Updated 7 months ago
- using wnbios64.sys for arbitrary r/w☆15Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 2 years ago
- A method to Disable DSE using .data ptr hooks☆33Updated last year
- Visual Studio 2019/2022 extension for building C/C++ projects with the LLVM Compiler Toolchain (installed separately).☆20Updated 9 months ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆111Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆109Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆29Updated 7 months ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆45Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆73Updated 2 years ago
- ☆140Updated 2 years ago
- 一款64位Exe程序动态追踪执行流程以及保存信息的工具☆49Updated 8 months ago
- X86 Packer with Portable Executable compatibility.☆55Updated last month
- A modern C++20 header-only library for advanced direct system call invocation.☆106Updated last month