momo5502 / ept-hook-detection
šŖ Different aproaches to detecting EPT hooks
ā108Updated 3 years ago
Alternatives and similar repositories for ept-hook-detection:
Users that are interested in ept-hook-detection are comparing it to the libraries listed below
- Kernel driver for detecting Intel VT-x hypervisors.ā184Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)ā59Updated last year
- Shows an example of how to implement VT-d/AMD-Vi on Windowsā108Updated last year
- Kernel ReClassExā61Updated last year
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.ā124Updated 3 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exeā69Updated last year
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.ā112Updated 3 years ago
- Ghetto user mode emulation of Windows kernel drivers.ā137Updated 6 months ago
- ā69Updated 2 years ago
- nmi stackwalking + module verificationā114Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudioā121Updated 10 months ago
- A simple ida python script to find .data ptrā51Updated 2 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memoryā54Updated 5 months ago
- This project migrated to https://github.com/backengineering/llvm-msvcā141Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchyā81Updated 2 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).ā50Updated last year
- Kernel Lazy Importerā113Updated last year
- based on https://github.com/secrary/Hooking-via-InstrumentationCallbackā71Updated 5 years ago
- ā74Updated last year
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.ā143Updated 3 years ago
- Discarded Section Manual Mapā67Updated 4 years ago
- ā133Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.ā71Updated 3 years ago
- Windows PDB parser for kernel-mode environment.ā94Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uā¦ā58Updated last year
- Obfuscate calls to imports by patching in stubsā67Updated 3 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.ā108Updated 3 years ago
- just proof of concept. hooking MmCopyMemory PG safe.ā67Updated last year
- Example of reading process memory through kernel special APCā104Updated 2 years ago
- base for testingā164Updated 7 months ago