Idov31 / NovaHypervisorLinks
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory…
☆137Updated this week
Alternatives and similar repositories for NovaHypervisor
Users that are interested in NovaHypervisor are comparing it to the libraries listed below
Sorting:
- bypassing intel txt's tboot integrity checks via coreboot shim☆70Updated 4 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆126Updated 3 weeks ago
- ☆91Updated last year
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆20Updated 3 weeks ago
- Rule Engine for Dynamic Malware Analysis and Research☆22Updated 2 months ago
- ☆88Updated 5 months ago
- Report and exploit of CVE-2024-21305.☆36Updated last year
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆21Updated 2 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆110Updated last year
- ☆31Updated 4 months ago
- ☆48Updated 3 months ago
- Finding Truth in the Shadows☆110Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆42Updated 8 months ago
- monitors hidden syscalls called from call of duty anticheat☆82Updated 6 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated last month
- ☆147Updated 2 months ago
- ☆71Updated 2 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 3 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated 11 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆46Updated last month
- uefi diskless persistence technique + OVMF secureboot bypass☆81Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆105Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆146Updated 10 months ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆65Updated 3 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆88Updated last month
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 4 months ago
- ☆47Updated last year
- A journal for $6,000 Riot Vanguard bounty.☆64Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.