Iizerd / BDASM
Binary DisASseMbler
☆23Updated 2 years ago
Alternatives and similar repositories for BDASM:
Users that are interested in BDASM are comparing it to the libraries listed below
- ☆29Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆27Updated last year
- ☆24Updated last year
- ☆29Updated 6 months ago
- Open Anti Cheat☆27Updated 2 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- ☆46Updated 3 years ago
- windows kernel pagehook☆39Updated 2 years ago
- ☆22Updated last year
- A Simple Example☆21Updated 6 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆51Updated last year
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- Kernel ReClassEx☆61Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆43Updated 6 months ago
- VEH debug plugin☆14Updated 2 years ago
- PAGE_GUARD based hooking library☆43Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated 10 months ago
- ☆19Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- ☆68Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- ☆35Updated 4 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- ☆22Updated last year