mike1k / HardwareBreakpoint
X86/X64 Hardware Breakpoint Manager
☆41Updated 3 years ago
Alternatives and similar repositories for HardwareBreakpoint:
Users that are interested in HardwareBreakpoint are comparing it to the libraries listed below
- A poc that abuses Enclave☆37Updated 2 years ago
- ☆27Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- ☆29Updated 6 months ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆50Updated last year
- Based on minhook☆30Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆41Updated 5 months ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- ☆30Updated last year
- Simple and lightweight hypervisor for AMD processors☆27Updated 3 months ago
- IDA scripts for hypervisor (Hyper-v) analysis and reverse engineering automation☆24Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- ☆69Updated 2 years ago
- ☆46Updated 3 years ago
- partially disable patchguard up to win11 21H2☆19Updated 9 months ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 9 months ago
- Kernel ReClassEx☆65Updated last year
- Binary DisASseMbler☆23Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 3 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆41Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆32Updated last year
- A Simple Example☆21Updated 6 years ago