Rhydon1337 / linux-kernel-patch-guardLinks
Minimal patch guard for linux kernel
☆30Updated 4 years ago
Alternatives and similar repositories for linux-kernel-patch-guard
Users that are interested in linux-kernel-patch-guard are comparing it to the libraries listed below
Sorting:
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Updated 8 years ago
- Rootkit & Anti-rootkit☆41Updated last year
- ☆36Updated 3 years ago
- ☆27Updated 7 years ago
- ☆37Updated 4 years ago
- VEH Redirect & VEH Debugger☆23Updated 5 years ago
- Static Library For Windows Drivers☆36Updated 3 weeks ago
- ☆21Updated 6 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆29Updated 4 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 5 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆55Updated 7 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- Enables x64 applications to call any x86 function through a special function called X86Call☆17Updated 9 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- a frame of amd-v svm nest☆53Updated 5 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆45Updated 2 years ago
- Intel learning hypervisor and some extend function☆22Updated 3 weeks ago
- Open Anti Cheat☆27Updated 3 years ago
- Implementation of a LLVM Compiler Plugin for C++ Obfuscation☆43Updated 2 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 6 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 8 years ago
- ☆23Updated 2 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆36Updated last year