Idov31 / NovaHypervisorLinks
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory…
☆245Updated 4 months ago
Alternatives and similar repositories for NovaHypervisor
Users that are interested in NovaHypervisor are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- ☆93Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆162Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆252Updated last year
- RISC-V Virtual Machine☆278Updated 8 months ago
- ☆160Updated last month
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆244Updated 3 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆122Updated this week
- Windows KASLR bypass using prefetch side-channel☆174Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- Single header version of System Informer's phnt library.☆240Updated last month
- ☆90Updated 11 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆138Updated 3 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆300Updated 2 months ago
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆293Updated 2 months ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- SMM UEFI module and client for UMD privilege escalation☆65Updated 8 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Updated 3 weeks ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆261Updated 3 years ago
- An x86-64 code virtualizer for VM based obfuscation☆171Updated last year
- Modular and extensible library for Virtual Machine Introspection☆116Updated 3 weeks ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆436Updated 2 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆213Updated 5 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆132Updated 5 months ago