Windows PatchGuard Disabler x64

Credits and much love to Fyyre & how02, HELIOS, MDL, etc This project can be maintained by anyone familiar with Kernel Patch Protection with a little bit of effort, personally I make use of a custom hypervisor to study KPP. At this time (Jan2017) Microsoft is not actively updating KPP to address this tool. Pls note: this only works on the following Windows x64 Supported: - Windows 7 6.1.7601.23572 x64 - Windows 8.1 6.3.9600.18505 x64 - Windows 10 10.0.14393.693 x64 (as of 2017-01-11) Be certain to run the batch file as admin. 32bit versions of Windows are not currently supported and honestly won't be. Make sure your Operating System is fully updated using Windows Update including all service packs and important updates. ONLY EVER USE THE BATCH FILE, DO NOT MANUALLY INSTALL THE PATCHED KERNEL AND MAKE A BOOTLOADER ENTRY FOR IT. DO NOT BLAME ME WHEN YOU RUN THIS ON WINDOWS 8 AND YOU HAVE TO FIX IT WITH A LIVE CD!


: File: patchguard-disabler-20170118.7z Size: 10545897 SHA-256: 834ec2b386f84dc0fc868faab4862199c019d7e742b410c9dc1d8f98cbb03ee3 SHA-1: 40294e53b68c4aedc7acc2af3a07fe5eba7b4f3e It seems logical to assume various 3rd party applications (namely anti-malware) might interact poorly with this software. I personally have not had any issues, but if you experience a problem with a certain vendor please email me:


: 1) Restart the PC in your unpatched Windows environment. 2) Spawn an admin command prompt. 3) Run bcdedit /v 4) Locate the patched bootloader entry. Note its GUID 5) Run bcdedit /delete <GUID> 6) Optional: Remove the patched files (bootloader path) from the system. 7) Restart your PC and confirm that the patched OS is no longer available.


: File: patchguard-disabler-20160806.7z Size: 10515714 SHA-256: 9bbe356f4d29b434d8416594439f53fbb9df986d9b8fdc90b3f10c4479ec0184 SHA-1: 11239746e174b3df2dbd3a7ec1e1044bb854171b Supported: - Windows 7 (6.1.7601.23455) x64 - Windows 8.1 (6.3.9600.18378) x64 - Windows 10 (10.0.14393.0) x64 = = = File: patchguard-disabler-20160713.7z Size: 10252329 SHA-256: e6f6740b29b01ff4d9f9bf802ba63f771e92beaaa8f95588127bd8f8baeb5033 SHA-1: 05ebf3d828e958aaed175e0cb61bc66c1a0bf05b Supported: - Windows 7 (6.1.7601.23455) x64 - Windows 8.1 (6.3.9600.18378) x64 NEVER WINDOWS 8, ONLY 8.1! - Windows 10 (10.0.10586.494) x64 = = = For the old patchguard disabler including Vista support, go here. I am also selling an exploit that allows user land win32 and Xamarin or UWP apps in Windows 7/8.1/10 to enter PatchGuard contexts and modify memory arbitrarily. Contact me at the email listed above. Starting price for this exploit is 200.000 USD.