intel vt-x type 2 hypervisor
☆64Apr 13, 2025Updated 10 months ago
Alternatives and similar repositories for hv
Users that are interested in hv are comparing it to the libraries listed below
Sorting:
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- 这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得☆44Jun 16, 2024Updated last year
- Simple Intel VT-x type-2 hypervisor for 64-bit Linux.☆19Aug 18, 2020Updated 5 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- ☆37Sep 26, 2024Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- ☆29Mar 9, 2024Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆52Apr 24, 2023Updated 2 years ago
- kernel mode anti cheat☆642Aug 4, 2024Updated last year
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆343Aug 31, 2024Updated last year
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆376Feb 26, 2025Updated last year
- Kernel Level NMI Callback Blocker☆164Sep 27, 2025Updated 5 months ago
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆24Mar 30, 2025Updated 11 months ago
- ☆18Feb 5, 2025Updated last year
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆118May 29, 2025Updated 9 months ago
- 将驱动映射到会话空间☆38Aug 27, 2022Updated 3 years ago
- Virtualization Simply Code☆25May 13, 2022Updated 3 years ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆14Apr 6, 2024Updated last year
- 对Windbg以Exdi模式下调试windows做一些修复☆21Aug 25, 2023Updated 2 years ago
- POC usermode <=> kernel communication via ALPC.☆72Jun 6, 2024Updated last year
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- windows rootkit☆60May 2, 2024Updated last year
- ☆34Oct 10, 2023Updated 2 years ago
- The sequel to Voyager☆97Aug 21, 2024Updated last year
- ☆93Jun 3, 2024Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆83Nov 13, 2023Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Aug 16, 2023Updated 2 years ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆204Sep 27, 2025Updated 5 months ago
- a monitoring windows driver calls kernel api tools☆129Jul 5, 2024Updated last year
- ☆183May 20, 2022Updated 3 years ago
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆282Feb 16, 2026Updated 2 weeks ago
- Rusty Hypervisor - Windows Kernel Blue Pill Type-2 Hypervisor in Rust (Codename: Matrix)☆321Jul 7, 2024Updated last year
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago