Idov31 / NovaHypervisorLinks
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other means) by safeguarding defense products (AntiVirus / Endpoint Protection) and kernel memory structures and preventing unauthorized access to kernel memory…
☆220Updated last month
Alternatives and similar repositories for NovaHypervisor
Users that are interested in NovaHypervisor are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆223Updated last week
- bypassing intel txt's tboot integrity checks via coreboot shim☆80Updated 5 months ago
- ☆92Updated last year
- ☆152Updated 3 weeks ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆149Updated last year
- RISC-V Virtual Machine☆243Updated 2 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆224Updated 10 months ago
- Admin to Kernel code execution using the KSecDD driver☆255Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆156Updated 5 months ago
- Single header version of System Informer's phnt library.☆227Updated last week
- A universal binary patching dll.☆90Updated 10 months ago
- Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls☆148Updated 3 weeks ago
- Reverse engineering winapi function loadlibrary.☆210Updated 2 years ago
- Generate a proxy dll for arbitrary dll☆205Updated 10 months ago
- ☆88Updated 6 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆88Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆213Updated 4 months ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆125Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆370Updated 4 months ago
- An x86-64 code virtualizer for VM based obfuscation☆131Updated 8 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆252Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆127Updated 2 months ago
- compile-time control flow obfuscation using mba☆191Updated 2 years ago
- Process Injection using Thread Name☆277Updated 4 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆182Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆92Updated 3 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆327Updated 2 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆112Updated last week
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆122Updated 2 years ago