KelvinMsft / NoTruth
☆94Updated 7 years ago
Alternatives and similar repositories for NoTruth:
Users that are interested in NoTruth are comparing it to the libraries listed below
- first commit☆57Updated 4 years ago
- Collect different versions of Crucial modules.☆128Updated 6 months ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- ayy debuger☆88Updated 10 months ago
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- ☆123Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- the basic version of the ring0 physical memory read/write tool☆90Updated 5 years ago
- VM devirtualization PoC based on AsmJit and llvm☆109Updated 3 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆29Updated 4 years ago
- ☆67Updated 4 years ago
- ☆71Updated 2 years ago
- Intercepting DeviceControl via WPP☆132Updated 5 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆76Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- Kernel ReClassEx☆64Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆55Updated 11 months ago
- Manual PE image mapper☆62Updated 11 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆121Updated 2 years ago
- Different aproaches to detecting EPT hooks☆89Updated 2 years ago
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆68Updated 2 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- ☆127Updated 2 years ago
- ☆46Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- 使用vt进行无痕hook,支持r3☆53Updated 5 years ago
- disable most common windowsx64 systems patchguard☆84Updated 6 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆68Updated 5 years ago