Nitr0-G / PeVisorLinks
A project on the Unicorn emulator to emulate the code of Pe files in windows
☆27Updated 8 months ago
Alternatives and similar repositories for PeVisor
Users that are interested in PeVisor are comparing it to the libraries listed below
Sorting:
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- ☆27Updated last year
- Code virtualizer☆23Updated 9 years ago
- Symbolic Execution based on lifting amd64 to z3☆27Updated 11 months ago
- ☆30Updated 2 years ago
- ☆30Updated 3 years ago
- Using Zydis and LLVM to lift unsupported instructions to LLVM-IR☆29Updated 3 years ago
- ☆36Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆50Updated 4 years ago
- ☆36Updated 2 years ago
- Lightweight PDB symbol parser and resolver☆24Updated 7 months ago
- ☆16Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- x86-64 user mode emulation using Zydis☆46Updated 4 months ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 9 months ago
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆24Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- Binary Ninja plugin for automating VMProtect analysis☆60Updated 2 years ago
- x64 assembler library☆31Updated 11 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆19Updated last year
- ☆21Updated 3 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 3 years ago
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- pointer obfuscation☆26Updated 7 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 7 months ago
- ☆22Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆38Updated 2 years ago