Example of making debugger using Hardware Breakpoint + VEH
☆18May 13, 2021Updated 4 years ago
Alternatives and similar repositories for VEHTest
Users that are interested in VEHTest are comparing it to the libraries listed below
Sorting:
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- R3劫持所有异常☆15Jan 4, 2021Updated 5 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- ☆24May 17, 2022Updated 3 years ago
- ☆42Jul 1, 2022Updated 3 years ago
- Set hardware breakpoints programmaticaly - for windows x86/64☆29Jul 2, 2019Updated 6 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Remaps Wow & bypass CRC checks☆17May 10, 2020Updated 5 years ago
- Event handling implementation with C++11☆17Oct 5, 2018Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Jan 1, 2017Updated 9 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- ☆27Oct 16, 2017Updated 8 years ago
- Black Signature Driver☆24Oct 20, 2023Updated 2 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Windows kernel drivers simple HTTP library for modern C++☆40Jul 12, 2018Updated 7 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆42Feb 15, 2020Updated 6 years ago
- Usermode emulation of x64 EAC☆31Apr 30, 2021Updated 4 years ago
- https://www.youtube.com/watch?v=qsjGj_L1kyo☆10Jul 29, 2021Updated 4 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 8 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- NASM listing to shellcode converter☆14May 6, 2018Updated 7 years ago
- My Personal Kernel-Mode Process dumper☆13Feb 18, 2024Updated 2 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆47Jun 3, 2021Updated 4 years ago
- A Simple Example☆23Nov 30, 2018Updated 7 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆78Feb 20, 2023Updated 3 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- 无痕注入1☆11Jun 1, 2021Updated 4 years ago
- ☆10Nov 11, 2020Updated 5 years ago
- ☆12Apr 12, 2024Updated last year
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- What makes it page☆17Aug 24, 2022Updated 3 years ago
- window☆13Feb 24, 2017Updated 9 years ago