momo5502 / ept-hook-detectionLinks
šŖ Different aproaches to detecting EPT hooks
ā112Updated 3 years ago
Alternatives and similar repositories for ept-hook-detection
Users that are interested in ept-hook-detection are comparing it to the libraries listed below
Sorting:
- Kernel driver for detecting Intel VT-x hypervisors.ā188Updated last year
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.ā124Updated 3 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exeā71Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windowsā116Updated last year
- a minimalistic windows hypervisor for amd processorsā107Updated 2 years ago
- ā72Updated 2 years ago
- A simple ida python script to find .data ptrā51Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.ā113Updated 3 years ago
- PE-Dump-Fixerā105Updated 5 years ago
- Kernel ReClassExā62Updated last year
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.ā80Updated 4 years ago
- Discarded Section Manual Mapā68Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchyā81Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into codeā68Updated 3 years ago
- ā78Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driverā71Updated 2 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyā84Updated 4 years ago
- nmi stackwalking + module verificationā124Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)ā70Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudioā127Updated last year
- Ghetto user mode emulation of Windows kernel drivers.ā139Updated 8 months ago
- Obfuscate calls to imports by patching in stubsā69Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.ā71Updated 3 years ago
- Kernel Lazy Importerā121Updated last year
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.ā145Updated 3 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallbackā71Updated 5 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memoryā58Updated 6 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uā¦ā60Updated last year
- ā97Updated 7 years ago
- Intercepting DeviceControl via WPPā134Updated 5 years ago