Idov31 / NovaHypervisorLinks
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory…
☆235Updated last month
Alternatives and similar repositories for NovaHypervisor
Users that are interested in NovaHypervisor are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆264Updated 2 weeks ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 8 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆81Updated 2 months ago
- ☆95Updated last year
- ☆155Updated 3 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆160Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆157Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- Modular and extensible library for Virtual Machine Introspection☆111Updated 3 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆209Updated last week
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated 3 weeks ago
- RISC-V Virtual Machine☆255Updated 5 months ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆98Updated 5 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆407Updated this week
- ntoskrnl.exe and bootmgfw.efi obfuscated with CodeDefender☆49Updated 3 weeks ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆129Updated last year
- Automated multi-engine framework for unpacking, analyzing, and devirtualizing binaries protected by commercial and custom Virtual Machine…☆277Updated last month
- ☆90Updated 9 months ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆70Updated 3 weeks ago
- An x86-64 code virtualizer for VM based obfuscation☆142Updated 10 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆194Updated 2 months ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆83Updated this week
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆239Updated last year
- Single header version of System Informer's phnt library.☆233Updated last week
- Simple, fast and lightweight Header-Only C++ Assembler Library☆129Updated 3 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆126Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 6 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated last month