x64 PE-COFF virtualization driven obfuscation engine
☆58Oct 14, 2022Updated 3 years ago
Alternatives and similar repositories for Singularity
Users that are interested in Singularity are comparing it to the libraries listed below
Sorting:
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 3 years ago
- Binary DisASseMbler☆24Sep 26, 2022Updated 3 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆138Jun 30, 2022Updated 3 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Sep 12, 2019Updated 6 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆24Nov 17, 2020Updated 5 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆268Aug 31, 2022Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Mar 5, 2021Updated 4 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆99Aug 27, 2022Updated 3 years ago
- A Type-1 hypervisor aimed to implement kernel hotswapping☆30Feb 8, 2024Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Aug 11, 2023Updated 2 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- ☆47Feb 27, 2022Updated 4 years ago
- x86 PE Mutator☆233Dec 24, 2022Updated 3 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Jan 9, 2023Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Discarded Section Manual Map☆70Jun 18, 2020Updated 5 years ago
- capcom-like executor for any physmem driver☆57Jan 6, 2022Updated 4 years ago
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- Mathematical Operation Simplifier for .NET Applications☆17Nov 20, 2019Updated 6 years ago
- ☆53Oct 16, 2021Updated 4 years ago
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Jun 22, 2021Updated 4 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- base for testing☆186Sep 28, 2024Updated last year
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆534May 24, 2022Updated 3 years ago
- 64 bit monolithic nt-style kernel☆98Apr 14, 2021Updated 4 years ago