Multicore x64 kernel with a focus on introspection and debugging capabilities.
☆64Jun 27, 2024Updated last year
Alternatives and similar repositories for perf_kernel
Users that are interested in perf_kernel are comparing it to the libraries listed below
Sorting:
- RISC-V Disassembler☆18Aug 25, 2020Updated 5 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆106Jun 28, 2020Updated 5 years ago
- HAXM hypervisor client☆18Nov 30, 2018Updated 7 years ago
- AMD SVM hypervisor rootkit proof of concept☆49Sep 23, 2023Updated 2 years ago
- VMX intrinsics plugin for Hex-Rays decompiler☆74Oct 28, 2019Updated 6 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Disks for DMA☆141Apr 28, 2021Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- ☆15Oct 7, 2020Updated 5 years ago
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- Windows device tree walker☆15Sep 19, 2018Updated 7 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆24May 20, 2021Updated 4 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆117May 26, 2020Updated 5 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17May 2, 2018Updated 7 years ago
- Modifies the code of the RtlUserThreadStart callback and reads the arguments passed to it. Then it changes the initial execution argument…☆15Mar 4, 2018Updated 7 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- Analyze patches in a process☆259Jul 28, 2021Updated 4 years ago
- Lua in kernel-mode because why not.☆367Dec 3, 2021Updated 4 years ago
- Unpacking VMProtected Executable Guide☆127Apr 25, 2020Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆282Feb 16, 2026Updated last week
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- EasyAntiCheat Integrity check bypass by mimicking memory changes☆352Sep 13, 2020Updated 5 years ago
- LCXL影子系统☆47Aug 16, 2024Updated last year
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Jan 2, 2021Updated 5 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- A hypervisor hiding user-mode memory using EPT☆107Jan 28, 2018Updated 8 years ago