Idov31 / NovaHypervisorLinks
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory…
☆237Updated 2 months ago
Alternatives and similar repositories for NovaHypervisor
Users that are interested in NovaHypervisor are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆270Updated last week
- Virtual Trust Level (VTL 1) secure call tracing☆83Updated 3 months ago
- ☆93Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 9 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆230Updated last month
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆168Updated 3 months ago
- ☆156Updated last month
- RISC-V Virtual Machine☆268Updated 6 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆134Updated last year
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆158Updated last year
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆206Updated 3 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆136Updated 2 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆240Updated last year
- Modular and extensible library for Virtual Machine Introspection☆109Updated 4 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆420Updated 2 weeks ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆106Updated this week
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆274Updated last month
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆267Updated 2 weeks ago
- SMM UEFI module and client for UMD privilege escalation☆62Updated 6 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- ☆89Updated 10 months ago
- VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advan…☆22Updated 9 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆128Updated 2 years ago
- An x86-64 code virtualizer for VM based obfuscation☆155Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆80Updated 2 months ago
- Single header version of System Informer's phnt library.☆237Updated last week
- Admin to Kernel code execution using the KSecDD driver☆259Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year