zorftw / kdmapper-rsLinks
Rust port of kdmapper
☆22Updated 3 years ago
Alternatives and similar repositories for kdmapper-rs
Users that are interested in kdmapper-rs are comparing it to the libraries listed below
Sorting:
- A thin Rust wrapper around Windows' hardware breakpoints.☆21Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆78Updated last year
- Rust bindings for VMProtect.☆27Updated last year
- silence file system monitoring components by hooking their minifilters☆57Updated last year
- Minimalistic Windows Kernel Allocator.☆49Updated 9 months ago
- Reflective DLL self-loading as a library☆20Updated last month
- Rust implementation of lazy_importer☆56Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆47Updated 2 years ago
- rekk is set of tools written in Rust to obfuscate ELF & PE executables with nanomites.☆31Updated 6 months ago
- Finding Truth in the Shadows☆107Updated 2 years ago
- using wnbios64.sys for arbitrary r/w☆13Updated last year
- A minimalistic logger for Windows Kernel Drivers.☆24Updated last year
- Dynamically invoke arbitrary code and use various tricks written idiomatically in Rust (Dinvoke)☆79Updated last week
- A VMWare logger using built-in backdoor.☆30Updated 8 months ago
- ☆47Updated last year
- A native Windows library for intercepting kernel-to-user transitions using instrumentation callbacks☆21Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 2 months ago
- Compileable POC of namazso's x64 return address spoofer.☆52Updated 5 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆45Updated 3 weeks ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆40Updated 7 months ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆55Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆36Updated last year
- Remote Thread Detection with a Kernel Driver☆30Updated 5 months ago
- Exploiting the KsecDD Windows driver through Server Silos☆72Updated 7 months ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated last week
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆30Updated 2 years ago