kyle-elliott / DVM
Symbolic Execution based on lifting amd64 to z3
☆16Updated 2 months ago
Related projects: ⓘ
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆49Updated 7 months ago
- Shows an example of how to implement VT-d/AMD-Vi on Windows☆74Updated 11 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆20Updated last year
- A simple ida python script to find .data ptr☆44Updated last year
- A devirtualization engine for Themida.☆81Updated 6 months ago
- Kernel ReClassEx☆58Updated 10 months ago
- VM devirtualization PoC based on AsmJit and llvm☆102Updated 3 years ago
- ☆20Updated last year
- ☆19Updated this week
- nmi stackwalking + module verification☆78Updated 8 months ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆92Updated last year
- Discarded Section Manual Map☆65Updated 4 years ago
- ☆66Updated 2 years ago
- Just check hypervisor in ring0☆13Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆77Updated last year
- ☆30Updated 2 years ago
- This tool Decrypt and Extract the files from the EAC☆61Updated last year
- just proof of concept. hooking MmCopyMemory PG safe.☆60Updated 10 months ago
- Binary rewriter for 64-bit PE files.☆40Updated 7 months ago
- A intel hypervisor, implementing many virtualization techniques☆35Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆63Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆60Updated last year
- a minimalistic windows hypervisor for amd processors☆96Updated 2 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆116Updated 2 years ago
- ☆41Updated this week
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆77Updated 3 years ago
- ☆40Updated 2 years ago
- Windows PDB parser for kernel-mode environment.☆82Updated last year
- Kernel Lazy Importer☆107Updated 5 months ago