backengineering / elderscroll
PDB Rewriting Rust Library
☆20Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for elderscroll
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆33Updated 11 months ago
- C/C++ antidebugging library for 32 and 64 bit processors☆12Updated 4 months ago
- A minimalistic logger for Windows Kernel Drivers.☆20Updated 8 months ago
- A VMWare logger using built-in backdoor.☆25Updated 3 weeks ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆16Updated 4 months ago
- Rust library for lifting raw binary data to LLVM IR☆39Updated last month
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆30Updated last month
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆20Updated 2 months ago
- Disassembler for Zeus VM custom instruction set☆23Updated 9 months ago
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆45Updated 3 months ago
- My research WIP bluepill hypervisor☆41Updated last year
- Me fockin' pe protector☆45Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- Easily search LLVM headers for all major versions!☆15Updated 3 weeks ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆13Updated 4 months ago
- Lightweight PDB symbol parser and resolver☆25Updated 2 weeks ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆38Updated last month
- Playing with LLVM passes☆35Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆12Updated 9 months ago
- An example of how to use Microsoft Windows Warbird technology☆25Updated last year
- ☆15Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆19Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- ☆29Updated 2 years ago
- Zydis JavaScript bindings via WASM☆16Updated last year
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆48Updated last year
- Report and exploit of CVE-2024-21305.☆30Updated 9 months ago
- Inlay hints for hex-rays☆24Updated last month