VEH Redirect & VEH Debugger
☆23May 18, 2020Updated 5 years ago
Alternatives and similar repositories for runtime
Users that are interested in runtime are comparing it to the libraries listed below
Sorting:
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- XDV is disassembler or debugger that works based on the extension plugin.☆55Sep 3, 2019Updated 6 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Jul 20, 2021Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆44Sep 1, 2018Updated 7 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- A minimalistic way to spoof return addresses without using exceptions☆17Jul 26, 2022Updated 3 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆42Feb 15, 2020Updated 6 years ago
- ☆24May 17, 2022Updated 3 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- ☆17Oct 31, 2022Updated 3 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- Only for Stress-Testing☆26Apr 9, 2022Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- Branch based windows debugger☆22Jul 30, 2019Updated 6 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- ☆34Aug 14, 2023Updated 2 years ago
- x64dbg Plugin SDK For x64 Assembler☆22Sep 10, 2018Updated 7 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- ☆17Dec 3, 2020Updated 5 years ago
- Simple bfv internal cheat☆46Dec 9, 2019Updated 6 years ago
- ☆37May 21, 2022Updated 3 years ago
- Window Executable file Function tracer using Debugging API☆44Sep 26, 2019Updated 6 years ago
- Windbg Utility Tools based upon PyKD☆42Sep 9, 2020Updated 5 years ago
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- A method to hook driver control dispatches without triggering anti cheat detection from BE and EAC☆49Apr 7, 2021Updated 4 years ago
- ☆44Oct 7, 2018Updated 7 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Valgrind tool for tracing memory accesses☆13Feb 6, 2025Updated last year
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- A simple MmCopyMemory hook.☆38Jul 11, 2022Updated 3 years ago