hook all win32k syscalls with a single .data pointer swap

Updated 5 months ago

swap driver on disk and memory with a Microsoft driver.

Updated 5 months ago

inserts a PML4E where a prior PML4E is set to not present, pointing at the PDPT that contains the dll.

Updated 5 months ago

old probe from 6/xx/2020 to test theoretical page table concepts

Updated 5 months ago

run code in an address space not associated with a process.

Updated 5 months ago

/proc/kmem reimplementation for windows

Updated 5 months ago

Process Cloning

Updated 5 months ago

Reverse engineering of R6 Cheat.

Updated 5 months ago

inject a process into your context.

Updated 5 months ago

Updated 5 months ago

Vulnerable Driver Manipulation

Updated 5 months ago

Process-Context Specific Kernel Driver Mapper (PSKDM)

Updated 5 months ago

Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)

Updated 1 month ago

PSKP - Process-Context Specific Kernel Patches

Updated 5 months ago

Paging Table Manipulation From Usermode

Updated 5 months ago

handle elevation using bedaisy. write up can be found here https://back.engineering/21/08/2020/

Updated 5 months ago

reverse engineering of bedaisy.sys (battleyes kernel driver)

Updated 5 months ago

header only library for NtLoadDriver/NtUnloadDriver.

Updated 5 months ago

unfairgames reverse engineered.

Updated 5 months ago

header only library for manually mapping dll's.

Updated 5 months ago