can1357 / NtRays
Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.
☆587Updated 2 months ago
Alternatives and similar repositories for NtRays:
Users that are interested in NtRays are comparing it to the libraries listed below
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆378Updated 4 years ago
- A VMP to VTIL lifter.☆434Updated 3 years ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆347Updated 5 months ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆862Updated 5 years ago
- System call hook for Windows 10 20H1☆483Updated 3 years ago
- Windows NT x64 syscall fuzzer☆598Updated last year
- A library to develop kernel level Windows payloads for post HVCI era☆395Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆482Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆232Updated last month
- Research on Windows Kernel Executive Callback Objects☆286Updated 5 years ago
- Debugger Anti-Detection Benchmark☆324Updated last year
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆833Updated 10 months ago
- UEFI bootkit for driver manual mapping☆534Updated last year
- COFF and Portable Executable format described using standard C++ with no dependencies.☆278Updated last month
- Analyze patches in a process☆251Updated 3 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆593Updated 6 years ago
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆803Updated 4 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆408Updated last year
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆436Updated 4 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆536Updated 3 months ago
- Native code virtualizer for x64 binaries☆476Updated 3 months ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆333Updated 2 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆295Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,158Updated last year
- Inline syscalls made easy for windows on clang☆698Updated 9 months ago
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆547Updated this week
- An AVX Lifter for the Hex-Rays Decompiler☆301Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.