momo5502 / ept-hook-detectionLinks
šŖ Different aproaches to detecting EPT hooks
ā114Updated 3 years ago
Alternatives and similar repositories for ept-hook-detection
Users that are interested in ept-hook-detection are comparing it to the libraries listed below
Sorting:
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)ā71Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exeā72Updated last year
- Ghetto user mode emulation of Windows kernel drivers.ā142Updated 8 months ago
- Kernel ReClassExā62Updated last year
- a minimalistic windows hypervisor for amd processorsā122Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.ā124Updated 3 years ago
- Shows an example of how to implement VT-d/AMD-Vi on Windowsā129Updated last year
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memoryā60Updated 7 months ago
- ā74Updated 2 years ago
- A library to assist with memory & code protection.ā60Updated last year
- A simple ida python script to find .data ptrā51Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.ā189Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.ā114Updated 3 years ago
- PE-Dump-Fixerā109Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallbackā71Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchyā82Updated 2 years ago
- Discarded Section Manual Mapā69Updated 5 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyā84Updated 4 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.ā71Updated 3 years ago
- nmi stackwalking + module verificationā127Updated last year
- ā97Updated 7 years ago
- just proof of concept. hooking MmCopyMemory PG safe.ā75Updated last year
- This project migrated to https://github.com/backengineering/llvm-msvcā145Updated last year
- ā45Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheatā71Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uā¦ā60Updated last year
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.ā46Updated last year
- Windows PDB parser for kernel-mode environment.ā98Updated last month
- ā138Updated 2 years ago
- Example driver on how to use SKLibā53Updated 7 months ago