Archie-osu / ZenHvLinks
my first hypervisor.
☆23Updated last year
Alternatives and similar repositories for ZenHv
Users that are interested in ZenHv are comparing it to the libraries listed below
Sorting:
- A library to assist with memory & code protection.☆65Updated last year
- 将驱动映射到会话空间☆38Updated 3 years ago
- ☆73Updated 3 years ago
- Only for Stress-Testing☆26Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Updated 7 years ago
- Register a callback in Kernel from a manually mapped driver☆43Updated 4 years ago
- Hiding a system thread against conventional means of detection☆41Updated 5 years ago
- detect hypervisor with Nmi Callback☆42Updated 3 years ago
- https://githacks.org/Shawick/goodeye.git☆52Updated 5 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆144Updated 3 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Updated 3 years ago
- A method to Disable DSE using .data ptr hooks☆38Updated 2 years ago
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆22Updated last year
- ☆19Updated last year
- ☆63Updated 3 years ago
- ☆11Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Updated 3 years ago
- Discarded Section Manual Map☆68Updated 5 years ago
- POC Hook of nt!HvcallCodeVa☆54Updated 2 years ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆102Updated 2 years ago
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆84Updated 4 months ago
- POC usermode <=> kernel communication via ALPC.☆70Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- 收集常用windows版本内核文件☆35Updated 2 years ago
- Mapping your code on a 0x1000 size page☆71Updated 3 years ago