archercreat / hypereye
My research WIP bluepill hypervisor
☆41Updated 2 years ago
Alternatives and similar repositories for hypereye:
Users that are interested in hypereye are comparing it to the libraries listed below
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 8 months ago
- ☆38Updated 2 years ago
- ☆30Updated 3 years ago
- ☆15Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- ☆27Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆16Updated 10 months ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- x86-64 Automated test data generator☆22Updated 3 months ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆38Updated 2 years ago
- A poc that abuses Enclave☆38Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- A intel hypervisor, implementing many virtualization techniques☆43Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- ☆29Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Code virtualizer☆23Updated 8 years ago
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆22Updated 7 months ago
- ☆22Updated last year
- A efi-runner and message logger for vmware.☆12Updated last week
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- x86-64 user mode emulation using Zydis☆46Updated 3 months ago
- VTIL command line utility☆27Updated 3 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 6 months ago
- A minimalistic way to spoof return addresses without using exceptions☆14Updated 2 years ago