archercreat / hypereye
My research WIP bluepill hypervisor
☆41Updated last year
Alternatives and similar repositories for hypereye:
Users that are interested in hypereye are comparing it to the libraries listed below
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆15Updated 8 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 6 months ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆38Updated 2 years ago
- ☆24Updated last year
- ☆15Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆21Updated 5 months ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 8 months ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- A poc that abuses Enclave☆36Updated 2 years ago
- ☆30Updated last year
- A efi-runner and message logger for vmware.☆14Updated 4 months ago
- A minimalistic way to spoof return addresses without using exceptions☆14Updated 2 years ago
- Simple and lightweight hypervisor for AMD processors☆27Updated 2 months ago
- ☆27Updated last year
- ☆29Updated 5 months ago
- ☆30Updated 3 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆36Updated 4 months ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆22Updated 3 years ago
- x64 assembler library☆31Updated 9 months ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆22Updated 2 years ago
- x86-64 user mode emulation using Zydis☆44Updated 2 months ago
- POC Hook of nt!HvcallCodeVa☆49Updated last year