Shhoya / Shh0yaTool
Analyze tool for windows reverser
☆29Updated last year
Alternatives and similar repositories for Shh0yaTool:
Users that are interested in Shh0yaTool are comparing it to the libraries listed below
- ☆45Updated 2 years ago
- Kernel ReClassEx☆65Updated last year
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- ☆78Updated 3 years ago
- VMP Mutation API Fix☆40Updated 3 years ago
- ☆48Updated last year
- UEDumper☆41Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆80Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆109Updated 3 years ago
- x64 manual mapper using inline syscalls☆8Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆123Updated 2 years ago
- A simple ida python script to find .data ptr☆49Updated last year
- Discarded Section Manual Map☆67Updated 4 years ago
- ☆41Updated 2 years ago
- ☆71Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- Only for Stress-Testing☆24Updated 2 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- ☆68Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- i stole this from some guys private repo on github☆55Updated 3 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆50Updated 2 years ago
- Kernel driver that uses Shared memory to communicate with UserMode☆85Updated 5 years ago
- clearing traces of a loaded driver☆46Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- ☆67Updated 3 years ago