Proof-of-concept game using VBS enclaves to protect itself from cheating
☆51Nov 10, 2024Updated last year
Alternatives and similar repositories for SecureGame
Users that are interested in SecureGame are comparing it to the libraries listed below
Sorting:
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆236Jan 24, 2025Updated last year
- Translate virtual addresses to physical addresses from usermode.☆112Jun 7, 2024Updated last year
- nmi stackwalking + module verification☆165Dec 28, 2023Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Mar 15, 2025Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆229Jul 17, 2024Updated last year
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆116Dec 8, 2024Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆126Dec 6, 2024Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- Helper functions for calculating the authenticode digest for a portable executable file☆21Apr 30, 2020Updated 5 years ago
- ☆31Dec 5, 2024Updated last year
- ☆278Sep 2, 2025Updated 6 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆24Nov 9, 2023Updated 2 years ago
- Collection of hypervisor detections☆301Sep 25, 2024Updated last year
- Preventing internal cheats with process mitigation policies☆14Jul 23, 2023Updated 2 years ago
- ☆29Mar 9, 2024Updated 2 years ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Updated this week
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 7 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆160Sep 3, 2023Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆47Sep 3, 2023Updated 2 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆416Apr 19, 2025Updated 11 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆83Dec 21, 2022Updated 3 years ago
- Function hooks in Windows NT Kernel☆27Oct 13, 2020Updated 5 years ago
- Kernel Level NMI Callback Blocker☆168Sep 27, 2025Updated 5 months ago
- Stealth-focused Intel VT-x hypervisor base (EAC/BE/ACs/AVs).☆79Updated this week
- Finding Truth in the Shadows☆125Jan 26, 2023Updated 3 years ago
- ☆15Mar 13, 2023Updated 3 years ago
- Deleting Shadow Copies In Pure C++☆118Oct 31, 2022Updated 3 years ago
- Report and exploit of CVE-2024-21305.☆41Jan 14, 2024Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- SoftWire lets you create new functions at run-time using functions and constructs which closely resemble x86 syntax, entirely within C++.…☆37Aug 25, 2014Updated 11 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- ☆14Dec 26, 2024Updated last year
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- An x86-64 Code Virtualizer☆311Sep 26, 2024Updated last year
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated last month
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Updated this week
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago