idkhidden / hiddenvmLinks
stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage stack manipulations.
☆14Updated 5 months ago
Alternatives and similar repositories for hiddenvm
Users that are interested in hiddenvm are comparing it to the libraries listed below
Sorting:
- ☆79Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆60Updated 11 months ago
- Kernel Level NMI Callback Blocker☆117Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- Crashes ida on static analyses.☆105Updated 4 months ago
- A simple ida python script to find .data ptr☆51Updated 2 years ago
- IoCreateDriver Implementation, it can be handful if you're trying to bypass anticheats☆98Updated 3 months ago
- ☆46Updated 7 months ago
- PoC over some VMP features☆23Updated last month
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆75Updated 2 years ago
- nmi stackwalking + module verification☆131Updated last year
- load unsigned kernel-driver by patching dse in 248 lines☆130Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆191Updated 7 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆72Updated 2 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆77Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆34Updated last year
- Makes IDA (most versions) to crash upon opening it.☆99Updated last year
- kernel anticheat to test your driver against☆173Updated 2 months ago
- ☆56Updated 2 years ago
- Kernel Lazy Importer☆122Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆82Updated last year
- Just check hypervisor in ring0☆15Updated 2 years ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆72Updated last year
- bypass to the p2c(s) that I have run over the past few months.☆52Updated 2 years ago
- anti crack system protector☆99Updated last year
- PE-Dump-Fixer☆110Updated 5 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆164Updated 3 years ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆94Updated last year