by others
☆40Jan 28, 2018Updated 8 years ago
Alternatives and similar repositories for VTbasedDebuggerWin7
Users that are interested in VTbasedDebuggerWin7 are comparing it to the libraries listed below
Sorting:
- ☆34Jul 28, 2018Updated 7 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 6 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 4 months ago
- ☆125May 23, 2020Updated 5 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Mar 16, 2014Updated 11 years ago
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- ☆39Oct 29, 2020Updated 5 years ago
- Some garbage drivers written for getting started☆66Dec 31, 2019Updated 6 years ago
- ☆18Sep 27, 2016Updated 9 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- Intel Virtualization Technology demo☆73Oct 15, 2016Updated 9 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- ☆27May 27, 2017Updated 8 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- enable libemu run pe file and add some good modify☆14Feb 4, 2019Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Dec 10, 2018Updated 7 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- Collection Of Anti-Debugging Tricks☆100Dec 19, 2015Updated 10 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Kernel Inject Process☆11Jul 28, 2017Updated 8 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago