114 skills found · Page 1 of 4
carmaa / InceptionInception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
memflow / Memflowphysical memory introspection framework
ufrisk / LeechCoreLeechCore - Physical Memory Acquisition Library & The LeechAgent Remote Memory Acquisition Agent
4paradigm / K8s Vgpu SchedulerOpenAIOS vGPU device plugin for Kubernetes is originated from the OpenAIOS project to virtualize GPU device memory, in order to allow applications to access larger memory space than its physical capacity. It is designed for ease of use of extended device memory for AI workloads.
namazso / Physmem DriversA collection of various vulnerable (mostly physical memory exposing) drivers.
ReversecLabs / Physmem2profitPhysmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely
waryas / UMPMLibA library to manipulate physical memory from usermode.
RainbowDynamix / GhostKatzDump LSASS via physical memory read primitives in vulnerable kernel drivers
zer0condition / NVDrvAbusing nvidia driver (nvoclock.sys) for physical/virtual memory and control register manipulation.
waryas / EUPMAccessThis DKOM exploit enables any app in usermode to access physical memory directly
osresearch / RwmemRead and write physical memory on OS X
dmaivel / NtoseyeWindows kernel debugger for Linux hosts running Windows under KVM/QEMU
can1357 / Physical Mem ControllerA library to read physical memory and system-wide virtual memory.
Xacone / Eneio64 Driver ExploitsA serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W
SamLarenN / SpeedFan ExploitAbusing SpeedFan driver ability of physical memory manipulation
SamuelTulach / DirectPageManipulationA basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy
zouxianyu / PhysicalMemoryRWthe basic version of the ring0 physical memory read/write tool
isiddique2024 / Page Table InjectorWindows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and contextualized address space cloning
zer0condition / NTMemoryUsermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.
0x7ff / GolbMapping physical memory to user space (EL0) on iOS.