Shhoya / Shh0yaTool
Analyze tool for windows reverser
☆29Updated last year
Alternatives and similar repositories for Shh0yaTool:
Users that are interested in Shh0yaTool are comparing it to the libraries listed below
- VMP Mutation API Fix☆39Updated 2 years ago
- Kernel ReClassEx☆64Updated last year
- ☆45Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- ☆71Updated 2 years ago
- ☆68Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 2 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 2 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆83Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆49Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- ☆78Updated 3 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆68Updated 3 years ago
- ☆48Updated last year
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- ☆27Updated 3 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- Some garbage drivers written for getting started☆64Updated 5 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆95Updated last year
- ☆127Updated 2 years ago
- windows kernel pagehook☆39Updated 2 years ago