ck0i / CloakworkLinks
An advanced singular header-only C++20 obfuscation library with encryption and polymorphism.
☆33Updated last month
Alternatives and similar repositories for Cloakwork
Users that are interested in Cloakwork are comparing it to the libraries listed below
Sorting:
- Windows x64 DLL/Driver manual map injection on a non-present PML4E using physical memory read/writes, direct page table manipulation and …☆80Updated 3 months ago
- A simple ida python script to find .data ptr☆56Updated 2 years ago
- Hijacking Hyper-V at Runtime with DDMA☆74Updated 5 months ago
- Kernel ReClassEx☆66Updated 2 years ago
- PoC over some VMP features☆24Updated 6 months ago
- "Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-o…☆36Updated last week
- ☆73Updated 3 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆97Updated last year
- A minimal CR3 protection PoC (KdpTrap hook)☆15Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- ☆36Updated 3 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆36Updated 2 years ago
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆52Updated last year
- ☆37Updated last year
- A library to assist with memory & code protection.☆65Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- Automatic vtable detection, inheritance analysis, and function override tracking for reverse engineering compiled C++ binaries. Supports …☆107Updated last month
- A Windows Direct Syscall Library☆52Updated 9 months ago
- ☆83Updated last year
- Old way for blocking NMI interrupts☆28Updated 3 years ago
- ☆89Updated 2 years ago
- Just check hypervisor in ring0☆16Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- nmi stackwalking + module verification☆155Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆24Updated 9 months ago
- ☆11Updated 3 years ago
- ☆19Updated last year
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Updated 4 years ago
- detect hypervisor with Nmi Callback☆42Updated 3 years ago