The free OSR Learning Library has more than 50 articles on a wide variety of topics about writing and debugging device drivers and Minifilters. From introductory level to advanced. All the articles have been recently reviewed and updated, and are written using the clear and definitive style you've come to expect from OSR over the years.
Check out The OSR Learning Library at: https://www.osr.com/osr-learning-library/
We want to write a driver that scans and finds executable pages in kernel so we can find anything suspicious/manually mapped drivers
What is the most stable way of iterating through all the executable pages in kernel so we can scan their content? we don't want to use any undocumented method if possible, unless there is absolutely no other way of doing it.
we need this for our anti-cheat engine, because most of the cheaters will load their drivers manually, and we need a way to find these manually mapped drivers.
|Upcoming OSR Seminars|
|OSR has suspended in-person seminars due to the Covid-19 outbreak. But, don't miss your training! Attend via the internet instead!|
|Writing WDF Drivers||7 Dec 2020||LIVE ONLINE|
|Internals & Software Drivers||25 Jan 2021||LIVE ONLINE|
|Developing Minifilters||8 March 2021||LIVE ONLINE|