jdk8 / HyproLinks
VMI on BitVisor to detect hidden rootkits.
☆27Updated 8 years ago
Alternatives and similar repositories for Hypro
Users that are interested in Hypro are comparing it to the libraries listed below
Sorting:
- deprecated☆46Updated 6 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- Windows KExec☆25Updated 15 years ago
- A hypervisor or virtual machine monitor (VMM) fuzzer☆28Updated 5 years ago
- x86 Dynamic Binary Translator Library☆34Updated 4 years ago
- deprecated☆26Updated 6 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- ☆14Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 13 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- microVM☆52Updated 10 years ago
- x86_x64 emulator☆16Updated 10 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 9 years ago
- Kernel-mode file scanner☆18Updated 7 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- AllMemPro☆46Updated 7 years ago
- ☆14Updated 7 years ago
- ☆13Updated 8 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- CVE-2014-0816☆25Updated 8 years ago
- User-mode program parsing logs created by HyperPlatform☆18Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36Updated 9 years ago
- This is a pintool that can analyze target dynamically and output code blocks and "key frames".☆15Updated 10 years ago
- ☆34Updated 8 years ago
- Final Transparent encrypted version☆14Updated 8 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago