HoShiMin / Arch
A bunch of architectural headers for i386 and AMD64
☆36Updated last year
Alternatives and similar repositories for Arch:
Users that are interested in Arch are comparing it to the libraries listed below
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- A Simple Example☆21Updated 6 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- Kernel ReClassEx☆61Updated last year
- Disk based DMA for ATA and SCSI☆23Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆43Updated 5 months ago
- Simple and lightweight hypervisor for AMD processors☆28Updated 4 months ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 3 years ago
- ☆29Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- x64 assembler library☆31Updated 10 months ago
- ☆34Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- ☆68Updated 2 years ago
- A debugger library using VEH.☆54Updated 7 months ago
- Native API header files for the Process Hacker project (nightly).☆26Updated this week
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆52Updated 4 months ago
- Driver shared section communication☆44Updated 3 weeks ago
- Code virtualizer☆23Updated 8 years ago
- Hypervisor-based debugger for AMD processors☆51Updated 11 months ago
- x86-64 user mode emulation using Zydis☆46Updated 3 months ago
- Example of hijacking system calls via function pointer tables☆32Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆70Updated 3 years ago
- Based on minhook☆30Updated last year
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Disable NMI Callbacks with Kernelmode Driver☆18Updated 2 years ago