KelvinMsft / NoTruthLinks
☆98Updated 8 years ago
Alternatives and similar repositories for NoTruth
Users that are interested in NoTruth are comparing it to the libraries listed below
Sorting:
- first commit☆62Updated 5 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- the basic version of the ring0 physical memory read/write tool☆91Updated 6 years ago
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- ☆125Updated 5 years ago
- fix vmprotect import function used unicorn-engine.☆97Updated 2 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- ayy debuger☆90Updated last year
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- Some garbage drivers written for getting started☆66Updated 5 years ago
- Intercepting DeviceControl via WPP☆135Updated 6 years ago
- Windows Kernel Template Library☆114Updated 3 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆73Updated 2 years ago
- hook msr by amd svm☆124Updated 5 years ago
- Communication via callback☆73Updated 6 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- A debugger library using VEH.☆65Updated last year
- x64 syscall caller in C++.☆93Updated 7 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆128Updated 3 years ago
- VM devirtualization PoC based on AsmJit and llvm☆118Updated 4 years ago
- ☆72Updated 3 years ago
- ☆60Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆115Updated 9 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆150Updated last year
- 🪝 Various EPT hook detection approaches☆140Updated 4 months ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated 2 years ago
- ☆51Updated 4 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago