Shhoya / Shh0yaTool
Analyze tool for windows reverser
☆29Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Shh0yaTool
- VMP Mutation API Fix☆39Updated 2 years ago
- Kernel ReClassEx☆63Updated last year
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- direct systemcalls with a modern c++20 interface.☆42Updated last year
- ☆44Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ☆40Updated 2 years ago
- ☆125Updated last year
- ☆23Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆110Updated 2 years ago
- ☆69Updated 2 years ago
- A simple ida python script to find .data ptr☆47Updated last year
- ☆70Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆67Updated last year
- fix vmprotect import function used unicorn-engine.☆92Updated last year
- VMProtectTest☆37Updated last year
- Mapping your code on a 0x1000 size page☆69Updated 2 years ago
- windows kernel pagehook☆38Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆92Updated 2 years ago
- Windows PDB parser for kernel-mode environment.☆90Updated last year
- ☆32Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆81Updated last year
- ☆78Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆64Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆61Updated last year