killvxk / DisableWin10PatchguardPocLinks
pseudo-code to show how to disable patchguard with win10
☆296Updated 7 years ago
Alternatives and similar repositories for DisableWin10PatchguardPoc
Users that are interested in DisableWin10PatchguardPoc are comparing it to the libraries listed below
Sorting:
- Hide Driver By MiProcessLoaderEntry☆292Updated 6 years ago
- PatchGuard Research☆303Updated 6 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆431Updated 3 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆440Updated 4 years ago
- Windows Ark 工具的工程和一些demo☆191Updated 9 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆192Updated 8 years ago
- Hide codes/data in the kernel address space.☆189Updated 4 years ago
- ☆159Updated 4 years ago
- hook msr by amd svm☆123Updated 5 years ago
- ☆114Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆114Updated 8 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆129Updated 8 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆179Updated 6 years ago
- open-source x86/x64 usermode anti-anti-debug plugin☆226Updated 5 years ago
- The Kernel-Mode Winsock library, supporting TCP, UDP and Unix sockets (DGRAM and STREAM).☆253Updated 6 months ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆425Updated 4 years ago
- Collect different versions of Crucial modules.☆144Updated last year
- System call hook for Windows 10 20H1☆496Updated 4 years ago
- Simple Intel VT-x hypervisor☆331Updated last year
- 之前那份 是7600的,每次编译搞得好麻烦。更新一个VS2017可以直接编译的。☆151Updated 6 years ago
- Using Driver Global Injection dll, it can hide DLL modules☆523Updated 6 years ago
- VMProtect 3.x Anti-debug Method Improved☆613Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆226Updated 7 years ago
- Windows Driver Kit Extesion Header (Undoc)☆136Updated 3 years ago
- Detecting execution of kernel memory where is not backed by any image file☆259Updated 7 years ago
- ☆125Updated 5 years ago
- Syscall Monitor is a system monitor program (like Sysinternal's Process Monitor) using Intel VT-X/EPT for Windows7+☆745Updated 8 years ago
- modify from memorymodule. support exception☆219Updated 4 years ago
- A hypervisor hiding user-mode memory using EPT☆109Updated 7 years ago
- windows泄露源码☆244Updated 11 years ago