Nitr0-G / PeVisor
A project on the Unicorn emulator to emulate the code of Pe files in windows
☆21Updated 7 months ago
Alternatives and similar repositories for PeVisor:
Users that are interested in PeVisor are comparing it to the libraries listed below
- ☆22Updated last year
- ☆29Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- ☆13Updated 4 years ago
- x64 assembler library☆31Updated 10 months ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- ☆27Updated last year
- An example code of CiGetCertPublisherName☆15Updated 3 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- Achieving code execution through abusing vectored exception handling☆17Updated last year
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- a driver to enumerate registered pnp callbacks for a particular interface class based on reversal of IoRegisterPlugPlayNotification☆11Updated last year
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- ☆13Updated 11 months ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 8 months ago
- ☆22Updated last year
- A poc that abuses Enclave☆38Updated 2 years ago
- Not mine, just saved☆12Updated last year
- ☆17Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated 2 years ago
- Stealing signatures from pe files☆17Updated last month
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- ☆20Updated 3 years ago
- A minimalistic way to spoof return addresses without using exceptions☆14Updated 2 years ago