bi-zone / rdtsc-checkvirt-pocLinks
Virtualization detection through speculative execution PoCs and papers
☆69Updated 7 years ago
Alternatives and similar repositories for rdtsc-checkvirt-poc
Users that are interested in rdtsc-checkvirt-poc are comparing it to the libraries listed below
Sorting:
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- Elevation of privilege detector based on HyperPlatform☆122Updated 8 years ago
- reverse engineering extension plugin for windbg☆116Updated 5 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆95Updated 8 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Automatically exported from code.google.com/p/virtdbg☆99Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 9 years ago
- Enumerate user mode shared memory mappings on Windows.☆122Updated 4 years ago
- Simple proof of concept code for injecting libraries on 64bit processes from a 32bit process☆96Updated 6 years ago
- A C polymorphic and metamorphic engine☆70Updated 6 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Updated 14 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 14 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- Multi-purpose proof-of-concept tool based on CPU-Z CVE-2017-15303☆110Updated 7 years ago
- VMCS Auditor provides almost all of Intel's VMCS Layout checklist based on Bochs Emulator.☆32Updated 6 years ago
- A DLL that performs IAT hooking☆27Updated 7 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆64Updated 12 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆63Updated 6 years ago
- Bootkits Revisited☆40Updated 11 years ago
- ☆34Updated 7 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆58Updated 5 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 4 years ago
- Hypervisor based tool for monitoring system register accesses.☆147Updated 6 years ago
- Open Course for diving security internal☆51Updated 5 years ago
- Windbg extension to find PatchGuard pages☆121Updated 11 years ago
- ReactOS x86-32 syscall fuzzer☆58Updated last month
- Collection Of Anti-Debugging Tricks☆101Updated 9 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago