0x1c1101 / blazing_asmLinks
Simple, fast and lightweight Header-Only C++ Assembler Library
☆67Updated last month
Alternatives and similar repositories for blazing_asm
Users that are interested in blazing_asm are comparing it to the libraries listed below
Sorting:
- Hooking Windows' exception dispatcher to protect process's PML4☆181Updated 5 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆122Updated last year
- Binary rewriter for 64-bit PE files.☆83Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆124Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆55Updated 8 months ago
- nmi stackwalking + module verification☆127Updated last year
- ntoskrnl .data hooks for UM-KM communication☆40Updated last year
- DSE & PG bypass via BYOVD attack☆52Updated last year
- Windows PDB parser for kernel-mode environment.☆98Updated last month
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆137Updated 3 years ago
- A x86 CPU & Environment emulator for Windows user and kernel binaries.☆122Updated last month
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆210Updated 8 months ago
- Makes IDA (most versions) to crash upon opening it.☆94Updated 10 months ago
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆46Updated last year
- Fully working kernel-mode VAC bypass☆76Updated 4 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆46Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆157Updated 2 years ago
- compile-time control flow obfuscation using mba☆188Updated 2 years ago
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆67Updated 3 weeks ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆174Updated 11 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆71Updated last year
- a minimalistic windows hypervisor for amd processors☆122Updated 3 years ago
- Load dll with undocumented functions and debug symbols☆47Updated 11 months ago
- Exploit MsIo vulnerable driver☆108Updated 3 years ago
- ☆46Updated 5 months ago
- Compileable POC of namazso's x64 return address spoofer.☆52Updated 5 years ago
- Collection of hypervisor detections☆245Updated 9 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆189Updated 2 years ago
- A devirtualization engine for Themida.☆100Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆88Updated 8 months ago