hrbust86 / HookMsrBySVMLinks
hook msr by amd svm
☆125Updated 5 years ago
Alternatives and similar repositories for HookMsrBySVM
Users that are interested in HookMsrBySVM are comparing it to the libraries listed below
Sorting:
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- An Ark tool project,run on Win7 x86/x64☆117Updated 8 years ago
- ☆125Updated 5 years ago
- Windows Kernel Template Library☆114Updated 3 years ago
- Collect different versions of Crucial modules.☆143Updated last year
- Windows Driver Kit Extesion Header (Undoc)☆135Updated 4 years ago
- ☆98Updated 8 years ago
- disable most common windowsx64 systems patchguard☆86Updated 6 years ago
- VT-based PCI device monitor (SPI)☆154Updated 5 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆115Updated 9 years ago
- windows kernelmode and usermode IAT hook☆149Updated 4 years ago
- Hide codes/data in the kernel address space.☆187Updated 4 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Updated 8 years ago
- Translates WinDbg "dt" structure dump to a C structure☆134Updated 9 years ago
- Intel Virtualization Technology demo☆69Updated 9 years ago
- win10 pgContext dynamic dump (btc version)☆107Updated 5 years ago
- ayy debuger☆89Updated last year
- ☆160Updated 5 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆104Updated 4 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Updated 6 years ago
- ☆115Updated 6 years ago
- the basic version of the ring0 physical memory read/write tool☆90Updated 6 years ago
- Using C++ STL on Windows kernle development☆91Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆78Updated 14 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆180Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Updated 8 years ago
- Hypervisor based tool for monitoring system register accesses.☆150Updated 7 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆84Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Updated 6 years ago