Nitr0-G / PeVisor
A project on the Unicorn emulator to emulate the code of Pe files in windows
☆21Updated 6 months ago
Alternatives and similar repositories for PeVisor:
Users that are interested in PeVisor are comparing it to the libraries listed below
- ☆30Updated last year
- ☆27Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆22Updated last year
- A poc that abuses Enclave☆37Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- x64 assembler library☆31Updated 9 months ago
- Hijack NotifyRoutine for a kernelmode thread☆41Updated 2 years ago
- An example code of CiGetCertPublisherName☆14Updated 3 years ago
- Achieving code execution through abusing vectored exception handling☆17Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆39Updated 5 months ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆18Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated 9 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 7 months ago
- Disable threat tracing from the kernel..☆13Updated 2 years ago
- Not mine, just saved☆13Updated last year
- ☆15Updated 2 years ago
- A Simple Example☆21Updated 6 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated last month
- ☆13Updated 4 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 8 months ago