Haxathon Supremacy Virtual Machine
☆33May 22, 2017Updated 8 years ago
Alternatives and similar repositories for hsvm
Users that are interested in hsvm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22May 25, 2017Updated 8 years ago
- WIP - Play with Intel VM Extensions☆23Jun 12, 2017Updated 8 years ago
- OCaml bindings for libgccjit☆28Feb 13, 2017Updated 9 years ago
- Minifilter Driver☆15Feb 10, 2017Updated 9 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- hypervisor in windows device driver by intel vt☆14Aug 25, 2018Updated 7 years ago
- An attempt to reverse-engineer the protocol for Diablo III, allowing a MITM attack on the game by intercepting packets as they pass throu…☆13Jun 21, 2012Updated 13 years ago
- Guest to host VM escape exploit for Parallels Desktop☆27Nov 14, 2014Updated 11 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Malware sandbox evasion tricks and solution☆32Jul 5, 2017Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- ☆11Sep 28, 2017Updated 8 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- An ark tool's driver☆40May 11, 2017Updated 8 years ago
- Decrement Windows Kernel for fun and profit☆39Jan 29, 2018Updated 8 years ago
- [Not work] Deobfuscate obfuscated binaries!☆11Dec 16, 2016Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19May 18, 2014Updated 11 years ago
- Meld virtual machine.☆28Nov 20, 2015Updated 10 years ago
- ☆15Mar 8, 2017Updated 9 years ago
- CVE-2014-0816☆26Oct 5, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TLB Splitting with intel vt-d and KVM☆21Oct 18, 2017Updated 8 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- OCaml library to transform an Llvm control flow graph in an SMT formula.☆13Apr 20, 2018Updated 7 years ago
- Alina POS Source Code + Rootkit☆23Nov 3, 2015Updated 10 years ago
- A simple tool to help you capture Ioctls.☆20Aug 26, 2017Updated 8 years ago
- LCXL影子系统☆46Aug 16, 2024Updated last year
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- OCaml bindings for clang☆23May 1, 2018Updated 7 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- A Windows driver used to facilitate DLL injection☆27Oct 29, 2017Updated 8 years ago
- OCaml bindings to libuv -- Cross-platform asychronous I/O☆18Jan 12, 2015Updated 11 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Apr 6, 2020Updated 5 years ago
- Build Status A Haskell implementation of the ZKBoo protocol for non-interactive zero-knowledge arguments of boolean circuits.☆18Sep 1, 2018Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆23May 31, 2017Updated 8 years ago