The free OSR Learning Library has more than 50 articles on a wide variety of topics about writing and debugging device drivers and Minifilters. From introductory level to advanced. All the articles have been recently reviewed and updated, and are written using the clear and definitive style you've come to expect from OSR over the years.
Check out The OSR Learning Library at: https://www.osr.com/osr-learning-library/
We want to write a driver that scans and finds executable pages in kernel so we can find anything suspicious/manually mapped drivers
What is the most stable way of iterating through all the executable pages in kernel so we can scan their content? we don't want to use any undocumented method if possible, unless there is absolutely no other way of doing it.
we need this for our anti-cheat engine, because most of the cheaters will load their drivers manually, and we need a way to find these manually mapped drivers.
|Upcoming OSR Seminars|
|OSR has suspended in-person seminars due to the Covid-19 outbreak. But, don't miss your training! Attend via the internet instead!|
|Developing Minifilters||24 May 2021||Live, Online|
|Writing WDF Drivers||14 June 2021||Live, Online|
|Internals & Software Drivers||2 August 2021||Live, Online|
|Kernel Debugging||27 Sept 2021||Live, Online|