☆73Aug 31, 2022Updated 3 years ago
Alternatives and similar repositories for NMIStackWalk
Users that are interested in NMIStackWalk are comparing it to the libraries listed below
Sorting:
- ☆34Apr 11, 2023Updated 2 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- ☆183May 20, 2022Updated 3 years ago
- ☆193May 1, 2023Updated 2 years ago
- 从MmPfnData中枚举进程和页目录基址☆207Aug 18, 2023Updated 2 years ago
- Kernel dwm render☆168Oct 10, 2023Updated 2 years ago
- Not mine. Only for saving☆26Jun 28, 2022Updated 3 years ago
- ☆144Dec 10, 2022Updated 3 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆109Sep 1, 2022Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Oct 10, 2022Updated 3 years ago
- ☆223Mar 11, 2023Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- ☆174Mar 9, 2022Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- ☆35Oct 10, 2023Updated 2 years ago
- ☆17Dec 18, 2022Updated 3 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- Windows Kernel Misc☆25Sep 3, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- kernel mode anti cheat☆637Aug 4, 2024Updated last year
- ☆158May 21, 2024Updated last year
- ☆74Jan 15, 2022Updated 4 years ago
- 🪝 Various EPT hook detection approaches☆143Feb 22, 2026Updated last week
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- ☆23May 8, 2023Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆45Jan 6, 2023Updated 3 years ago
- a minimalistic windows hypervisor for amd processors☆138Jun 30, 2022Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆99Aug 27, 2022Updated 3 years ago
- base for testing☆186Sep 28, 2024Updated last year
- A Simple Example☆23Nov 30, 2018Updated 7 years ago