Protonr0 / AMD-HypervisorLinks
A basic Secure Virtual Machine hypervisor
☆23Updated 4 years ago
Alternatives and similar repositories for AMD-Hypervisor
Users that are interested in AMD-Hypervisor are comparing it to the libraries listed below
Sorting:
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated last year
- Virtualization Simply Code☆25Updated 3 years ago
- ☆38Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 11 months ago
- ☆25Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆20Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- ☆28Updated last year
- ☆23Updated 2 years ago
- windows kernel pagehook☆40Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆25Updated 3 years ago
- ntos shit☆26Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated last year
- My research WIP bluepill hypervisor☆41Updated 2 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆39Updated 2 years ago
- intel vt-x type 2 hypervisor☆56Updated 3 months ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆26Updated 2 years ago
- Binary DisASseMbler☆23Updated 2 years ago
- ☆24Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆43Updated 2 years ago
- ☆33Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- 这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得☆42Updated last year
- Code virtualizer☆25Updated 9 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Updated 2 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated last year
- x64 Windows implementation of virtual-address to physical-address translation☆42Updated 4 years ago