backengineering / Voyager
A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)
☆51Updated last year
Alternatives and similar repositories for Voyager:
Users that are interested in Voyager are comparing it to the libraries listed below
- just proof of concept. hooking MmCopyMemory PG safe.☆69Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆84Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆178Updated last year
- ☆71Updated 2 years ago
- A library to assist with memory & code protection.☆53Updated last year
- ☆52Updated 2 years ago
- Kernel ReClassEx☆65Updated last year
- nmi stackwalking + module verification☆106Updated last year
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).☆50Updated last year
- A simple ida python script to find .data ptr☆50Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆103Updated last year
- Example driver on how to use SKLib☆38Updated 4 months ago
- Mapping your code on a 0x1000 size page☆72Updated 2 years ago
- Discarded Section Manual Map☆65Updated 4 years ago
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- ☆23Updated 4 months ago
- Different aproaches to detecting EPT hooks☆101Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 2 years ago
- Kernel Level NMI Callback Blocker☆74Updated 6 months ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆39Updated 5 months ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 2 years ago
- InfinityHookProMax: Make InfinityHook great great again☆43Updated last year
- ☆74Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- ntoskrnl .data hooks for UM-KM communication☆37Updated 9 months ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆46Updated 6 months ago
- ☆73Updated 10 months ago