idkhidden / hiddenvmLinks
stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage stack manipulations.
☆26Updated 9 months ago
Alternatives and similar repositories for hiddenvm
Users that are interested in hiddenvm are comparing it to the libraries listed below
Sorting:
- ☆44Updated 11 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated last year
- ntoskrnl .data hooks for UM-KM communication☆52Updated last year
- spoof return address☆79Updated 2 years ago
- Translate virtual addresses to physical addresses from usermode.☆78Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆236Updated 2 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆215Updated 11 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆136Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆156Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 8 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆131Updated 2 years ago
- Rewrite and obfuscate code in compiled binaries☆273Updated 3 weeks ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 4 months ago
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- Extract sequences of instructions to be executed exclusively on a remote server☆37Updated 3 months ago
- manual map unsigned driver over signed memory☆212Updated last year
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆50Updated last month
- State of the art DLL injector that took 20 minutes to make☆223Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆20Updated 3 years ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆280Updated last month
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆108Updated 2 months ago
- Fully working kernel-mode VAC bypass☆89Updated 10 months ago
- Kernel Level NMI Callback Blocker☆152Updated 3 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆114Updated 3 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆53Updated last year
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆75Updated last week
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆274Updated last month
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆73Updated 9 months ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago