hrbust86 / HookMsrBySVMView external linksLinks
hook msr by amd svm
☆125Dec 30, 2019Updated 6 years ago
Alternatives and similar repositories for HookMsrBySVM
Users that are interested in HookMsrBySVM are comparing it to the libraries listed below
Sorting:
- a frame of amd-v svm nest☆53Apr 7, 2020Updated 5 years ago
- This is a simple driver with x64 inline assembly☆57Jun 26, 2020Updated 5 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- createfile☆50Oct 27, 2015Updated 10 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Sep 5, 2020Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆200Oct 19, 2016Updated 9 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Hypervisor based tool for monitoring system register accesses.☆153Sep 13, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆443Nov 29, 2021Updated 4 years ago
- Detecting execution of kernel memory where is not backed by any image file☆262Jul 11, 2018Updated 7 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆460Feb 18, 2021Updated 4 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Aug 3, 2023Updated 2 years ago
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 8 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- AMD SVM hypervisor rootkit proof of concept☆48Sep 23, 2023Updated 2 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Toolkit for Hyper-V security research☆157Mar 7, 2022Updated 3 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- This project demonstares an illegal read- and write- access to the kernel-mode data for both allocated by 3rd party drivers and EPROCESS …☆13Mar 6, 2018Updated 7 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Apr 6, 2019Updated 6 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- Wow64 syscall hook☆42May 28, 2017Updated 8 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆136Feb 15, 2019Updated 6 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- A software driver that lets you log kernel-mode debug output into a file on Windows.☆108Jul 24, 2018Updated 7 years ago
- ☆44Oct 7, 2018Updated 7 years ago