brew02 / BudgetEPT
Create stealthy, inline, EPT-like hooks using SMAP and SMEP
☆36Updated 4 months ago
Alternatives and similar repositories for BudgetEPT:
Users that are interested in BudgetEPT are comparing it to the libraries listed below
- Kernel ReClassEx☆65Updated last year
- POC Hook of nt!HvcallCodeVa☆49Updated last year
- ☆28Updated 4 months ago
- ☆71Updated 2 years ago
- partially disable patchguard up to win11 21H2☆18Updated 8 months ago
- A method to Disable DSE using .data ptr hooks☆29Updated last year
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆15Updated 8 months ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆37Updated 2 months ago
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- 将驱动映射到会话空间☆33Updated 2 years ago
- A simple ida python script to find .data ptr☆49Updated last year
- A poc that abuses Enclave☆36Updated 2 years ago
- A efi-runner and message logger for vmware.☆14Updated 3 months ago
- Kernel Level NMI Callback Blocker☆64Updated 5 months ago
- ☆30Updated last year
- A library to assist with memory & code protection.☆53Updated 11 months ago
- Patches DSE by swapping both data ptrs located in SeValidateImageHeader && SeValidateImageData☆19Updated last year
- Windows PDB parser for kernel-mode environment.☆94Updated 2 years ago
- intel vt-x type 2 hypervisor☆49Updated 7 months ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- Modmap updated to work on Windows 11☆28Updated 3 years ago
- A minimalistic way to spoof return addresses without using exceptions☆14Updated 2 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- ☆32Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆36Updated 8 months ago
- ☆10Updated 2 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆30Updated 10 months ago
- ☆24Updated last year