DeDf / HyperVisor
☆13Updated 9 years ago
Alternatives and similar repositories for HyperVisor:
Users that are interested in HyperVisor are comparing it to the libraries listed below
- ☆13Updated 6 years ago
- simple plugin for lastest olly versions to display the callstack☆16Updated 12 years ago
- Contains various pintools to supplement the Intel DBI framework☆12Updated 10 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Project for Injecting into Windows Processes☆13Updated 13 years ago
- Lists work items being queued currently.☆13Updated 9 years ago
- ☆7Updated 8 years ago
- Notes my learning steps about Windows-NT☆23Updated 7 years ago
- wow64 syscall filter☆13Updated 10 years ago
- A project dedicated towards researching the Windows operating system's kernel mode enviornment.☆8Updated 9 years ago
- User-mode kernel callback framework☆10Updated 11 years ago
- ☆12Updated 8 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 10 years ago
- Windows device tree walker☆15Updated 6 years ago
- PE rebuilder, based on yoda's realigndll☆12Updated 13 years ago
- Try to transport the tcpip stack of ReactOS to Windows XP.☆17Updated 11 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Updated 10 years ago
- Windows registry files interactive viewer☆9Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- Google Drive windows virtual unit☆9Updated 11 years ago
- windows内核小工具,包含APP和driver☆11Updated 10 years ago
- windows ntfs legasy file system filterUpdated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated 6 years ago
- ☆14Updated 8 years ago
- ☆12Updated 8 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- modified version of reshade, using modules to have game-specifics behaviors☆11Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago