JaanusKaapPublic / HyperViperView external linksLinks
Toolkit for Hyper-V security research
☆157Mar 7, 2022Updated 3 years ago
Alternatives and similar repositories for HyperViper
Users that are interested in HyperViper are comparing it to the libraries listed below
Sorting:
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Feb 15, 2019Updated 7 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆440Apr 11, 2025Updated 10 months ago
- Internals information about Hyper-V☆732Dec 20, 2025Updated last month
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- Hyper-V Research is trendy now☆179Jan 23, 2026Updated 3 weeks ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- Hyper-V Research is trendy now☆197May 6, 2024Updated last year
- Open Course for diving security internal☆52Nov 11, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Dump of win32k POCs for bugs I've found☆381Mar 6, 2022Updated 3 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆106Jun 28, 2020Updated 5 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- Research on Windows Kernel Executive Callback Objects☆315Feb 22, 2020Updated 5 years ago
- A windbg extension, extracting token related contents☆41Dec 23, 2020Updated 5 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆73Oct 28, 2019Updated 6 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- Reverse engineered source code of the autochk rootkit☆208Nov 1, 2019Updated 6 years ago
- C++ Exceptions in Windows Drivers☆221Dec 21, 2020Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆38Dec 10, 2018Updated 7 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- ☆41Jun 6, 2021Updated 4 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- 轻量级自动分析病毒程序调用上下文、游戏反调试实现技术平台☆100Jun 21, 2020Updated 5 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆629Jul 7, 2017Updated 8 years ago
- The runtime DXE driver monitoring access to the UEFI variables by hooking the runtime service table.☆146Oct 9, 2020Updated 5 years ago