SamuelTulach / winzentoolLinks
Port of zentool to Windows
☆27Updated 11 months ago
Alternatives and similar repositories for winzentool
Users that are interested in winzentool are comparing it to the libraries listed below
Sorting:
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 6 months ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆52Updated last month
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 11 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- C++ Assembler with Built-in Mutation Engine☆30Updated 5 months ago
- Symbolic Execution based on lifting amd64 to z3☆31Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆17Updated 10 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Updated last year
- Header-only C++ library for producing PE files.☆34Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆36Updated last year
- A C++ wrapper for icedx86 decoder☆46Updated 6 months ago
- Elevate arbitrary MSR writes to kernel execution.☆44Updated 2 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated 2 years ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆109Updated 3 weeks ago
- monitors hidden syscalls called from call of duty anticheat☆89Updated last year
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆71Updated 5 months ago
- kASLR bypass technique on Intel CPUs.☆32Updated 8 months ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆18Updated last year
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆36Updated last month
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- x86-64 Automated test data generator☆26Updated 5 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Updated 10 months ago
- devirtualization vmprotect☆65Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆127Updated 2 years ago
- Collection of Cheat dumps for Research and Detection.☆16Updated last month
- Lightweight PDB symbol parser and resolver☆27Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago