9176324 / DaatLinks
a simple intel vt code both support x86 & x64. PatchGuard monitor.
☆77Updated 4 years ago
Alternatives and similar repositories for Daat
Users that are interested in Daat are comparing it to the libraries listed below
Sorting:
- Some garbage drivers written for getting started☆66Updated 6 years ago
- For Example. See Miro's Blog☆30Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Open Anti Cheat☆27Updated 3 years ago
- ☆39Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Updated 7 years ago
- Another method to anti ThreadHideFromDebugger☆37Updated 6 years ago
- ☆27Updated 8 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- Static Library For Windows Drivers☆41Updated 3 weeks ago
- intel vt-x hypervisor ept☆24Updated 5 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- Intel Virtualization Technology demo☆69Updated 9 years ago
- Hook system calls, context switches, page faults and more.☆34Updated 6 years ago
- first commit☆64Updated 5 years ago
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆31Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- ☆99Updated 8 years ago
- ☆23Updated 6 years ago
- ☆48Updated 7 years ago
- ☆24Updated 7 years ago
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- ☆24Updated 6 years ago
- ☆52Updated 3 years ago
- windows kernel pagehook☆40Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- ☆126Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆107Updated 5 years ago