idkhidden / hiddenvmLinks
stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage stack manipulations.
☆26Updated 9 months ago
Alternatives and similar repositories for hiddenvm
Users that are interested in hiddenvm are comparing it to the libraries listed below
Sorting:
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆136Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆215Updated 11 months ago
- ☆44Updated 11 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆236Updated 2 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated 3 weeks ago
- spoof return address☆79Updated 2 years ago
- Translate virtual addresses to physical addresses from usermode.☆76Updated last year
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 8 months ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆114Updated 3 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆131Updated 2 years ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 4 months ago
- DSE & PG bypass via BYOVD attack☆76Updated 5 months ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆71Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆156Updated 2 years ago
- manual map unsigned driver over signed memory☆212Updated last year
- Load dll with undocumented functions and debug symbols☆47Updated last year
- A manual PE mapping implementation, aka reflective loader☆20Updated 3 years ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆49Updated last week
- Kernel Level NMI Callback Blocker☆152Updated 3 months ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- Fully working kernel-mode VAC bypass☆89Updated 10 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆280Updated last month
- nmi stackwalking + module verification☆151Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆53Updated last year
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆275Updated last month
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆95Updated last year
- Tool to dump EFI runtime drivers.☆38Updated last year