kkent030315 / anyvtopView external linksLinks
x64 Windows implementation of virtual-address to physical-address translation
☆46Jun 3, 2021Updated 4 years ago
Alternatives and similar repositories for anyvtop
Users that are interested in anyvtop are comparing it to the libraries listed below
Sorting:
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 4 years ago
- x64 Windows privilege elevation using anycall☆22May 28, 2021Updated 4 years ago
- Two PoC of accessing process virtual memory via NT Kernel☆22Jun 25, 2021Updated 4 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆242Jul 7, 2021Updated 4 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Aug 15, 2021Updated 4 years ago
- a dumb rpm/wpm example driver☆15Jun 7, 2021Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Oct 20, 2020Updated 5 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆199Feb 14, 2024Updated 2 years ago
- Example of reading process memory through kernel special APC☆110Apr 21, 2023Updated 2 years ago
- VEH debug plugin☆13Apr 28, 2022Updated 3 years ago
- Rootkit & Anti-rootkit☆42Jan 27, 2024Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆54May 8, 2023Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆385Jul 6, 2022Updated 3 years ago
- Bypassing kernel patch protection runtime☆21Feb 19, 2023Updated 2 years ago
- Libraries written in inline assembly☆19Aug 7, 2023Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- 基于Intel-VT技术的windows内核增强型驱动☆30Jun 9, 2022Updated 3 years ago
- Detect removed thread from PspCidTable.☆75Mar 18, 2022Updated 3 years ago
- IO隐藏通信封装☆17May 31, 2021Updated 4 years ago
- 巨硬☆17Oct 4, 2023Updated 2 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- clearing traces of a loaded driver☆47Jul 2, 2022Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18May 13, 2021Updated 4 years ago
- ☆16Oct 31, 2022Updated 3 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆52Dec 16, 2020Updated 5 years ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Sep 3, 2023Updated 2 years ago
- A kernel module dumper for Windows x64 using mhyprot vulnerable driver☆37Oct 26, 2020Updated 5 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Sep 18, 2020Updated 5 years ago
- Analyze Windows x64 Kernel Memory Layout☆129Nov 19, 2020Updated 5 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- A Kernel driver for using against anti cheats like EAC or BE☆15Aug 10, 2021Updated 4 years ago