memflow / memflow-win32
☆23Updated 6 months ago
Alternatives and similar repositories for memflow-win32:
Users that are interested in memflow-win32 are comparing it to the libraries listed below
- Labyrinth, an LLVM obfuscation plugin for the New Pass Manager☆39Updated last month
- ☆38Updated 2 years ago
- A intel hypervisor, implementing many virtualization techniques☆43Updated last year
- Windows driver mapper via the UEFI☆43Updated 3 weeks ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆52Updated 4 months ago
- ☆44Updated 9 months ago
- My research WIP bluepill hypervisor☆41Updated 2 years ago
- Modern C++ Networking Library☆34Updated 3 years ago
- Create and find signatures in Binary Ninja☆27Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆43Updated 6 months ago
- Hypervisor-based debugger for AMD processors☆51Updated 11 months ago
- ☆46Updated 3 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆55Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- PhysPatch performs physical memory scanning and patching of the entire Windows Kernel using DMA☆12Updated 5 months ago
- A kdmapper library for Rust☆17Updated 3 years ago
- Expanding Kernel Lazy Importer☆31Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- A efi-runner and message logger for vmware.☆12Updated 5 months ago
- Analyzing the driver and internal module of EasyAntiCheat.☆39Updated last year
- Native API header files for the Process Hacker project (nightly).☆26Updated this week
- Disk based DMA for ATA and SCSI☆23Updated last year
- Simple and lightweight hypervisor for AMD processors☆28Updated 4 months ago
- x86-64 Automated test data generator☆20Updated 2 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆83Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 9 months ago
- POC usermode <=> kernel communication via ALPC.☆53Updated 10 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- Bypass using kernel driver (not finish).☆20Updated last year