HyperDbg / gui
HyperDbg's Graphical User Interface (GUI)
☆75Updated last month
Alternatives and similar repositories for gui
Users that are interested in gui are comparing it to the libraries listed below
Sorting:
- Hypervisor-based debugger for AMD processors☆57Updated last year
- VM devirtualization PoC based on AsmJit and llvm☆114Updated 3 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆90Updated last month
- Kernel ReClassEx☆62Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆60Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆59Updated last year
- ☆97Updated 7 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆29Updated 4 months ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆184Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆137Updated 6 months ago
- Windows PDB parser for kernel-mode environment.☆97Updated 2 years ago
- A simple ida python script to find .data ptr☆51Updated 2 years ago
- ☆38Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆70Updated last year
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- ☆69Updated 2 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆58Updated 3 years ago
- ☆133Updated 2 years ago
- x64 syscall caller in C++.☆90Updated 6 years ago
- ☆31Updated 2 years ago
- Driver shared section communication☆50Updated 2 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆86Updated last year
- A debugger library using VEH.☆55Updated 8 months ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆112Updated last year
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆71Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆55Updated 5 months ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year