Code-Reuse Exploits detection using Intel Processor Trace
☆28May 19, 2018Updated 7 years ago
Alternatives and similar repositories for pt-detector
Users that are interested in pt-detector are comparing it to the libraries listed below
Sorting:
- kernel space code☆12Jun 8, 2019Updated 6 years ago
- POC of sysenter x64 LSTAR MSR hook☆41Jul 20, 2014Updated 11 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- ☆18Dec 5, 2016Updated 9 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Binary lifter and deobfuscator using remill for x86_64 Windows binaries☆59Updated this week
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Feb 26, 2026Updated last week
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- This implements a 64-bit version of vusec/vuzzer fuzzing tool.☆179Mar 29, 2022Updated 3 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆132Jul 16, 2023Updated 2 years ago
- HadesMem is a C++-based memory hacking library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆28Jan 7, 2015Updated 11 years ago
- https://githacks.org/Shawick/goodeye.git☆52Sep 2, 2020Updated 5 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Zydis Python Bindings (Work In Progress)☆32Dec 20, 2021Updated 4 years ago
- Windows Hypervisor Platform client☆31Jun 13, 2018Updated 7 years ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆51Jan 9, 2025Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Dec 7, 2018Updated 7 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- Programming/scripting language☆18Jan 3, 2025Updated last year
- Anti-rootkit works as a Windows system driver.☆13Mar 14, 2022Updated 3 years ago
- Hyper-V Research is trendy now☆198May 6, 2024Updated last year
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆73Dec 27, 2023Updated 2 years ago
- 关于intel和amd指令行为不一样这件事☆62Apr 15, 2022Updated 3 years ago
- FAROS: Illuminating In-Memory Injection Attacks via Provenance-based Whole System Dynamic Information Flow Tracking☆17Apr 1, 2018Updated 7 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- ☆13Aug 24, 2022Updated 3 years ago