jonomango / nohv
Kernel driver for detecting Intel VT-x hypervisors.
☆170Updated last year
Related projects ⓘ
Alternatives and complementary repositories for nohv
- Standard Kernel Library for Windows hacking in C++☆82Updated 2 months ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆181Updated 4 months ago
- Check your detection vectors☆136Updated last year
- a minimalistic windows hypervisor for amd processors☆98Updated 2 years ago
- Kernel Lazy Importer☆109Updated 6 months ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆117Updated 2 years ago
- nmi stackwalking + module verification☆85Updated 10 months ago
- ☆81Updated last week
- load unsigned kernel-driver by patching dse in 248 lines☆105Updated 7 months ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆135Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆122Updated 2 years ago
- Intercepting DeviceControl via WPP☆127Updated 4 years ago
- ☆139Updated 3 years ago
- base for testing☆151Updated last month
- Windows PDB parser for kernel-mode environment.☆87Updated last year
- Kernel ReClassEx☆62Updated 11 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆83Updated 6 months ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆83Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆67Updated 5 years ago
- A devirtualization engine for Themida.☆91Updated 8 months ago
- KDP compatible unsigned driver loader leveraging a write primitive in one of the IOCTLs of gdrv.sys☆130Updated 4 months ago
- A simple ida python script to find .data ptr☆46Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvc☆82Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆150Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆110Updated 2 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆79Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆62Updated 11 months ago
- manual map unsigned driver over signed memory☆181Updated 6 months ago
- DSE & PG bypass via BYOVD attack☆37Updated 7 months ago