momo5502 / hypervisorLinks
π§ͺ Hypervisor with EPT hooking support.
β233Updated last month
Alternatives and similar repositories for hypervisor
Users that are interested in hypervisor are comparing it to the libraries listed below
Sorting:
- Collection of hypervisor detectionsβ242Updated 9 months ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.β280Updated 2 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilitiesβ280Updated 4 months ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.β289Updated 10 months ago
- Emulate Drivers in RING3 with self context mapping or unicornβ341Updated 2 years ago
- Debugger Anti-Detection Benchmarkβ334Updated last year
- Browse Page Tables on Windows (Page Table Viewer)β210Updated 3 years ago
- alternative smm driver for ryzen motherboardsβ152Updated 8 months ago
- Ghetto user mode emulation of Windows kernel drivers.β140Updated 8 months ago
- IDA Pro plugin to make bitfield accesses easier to grepβ239Updated 4 months ago
- πͺ Different aproaches to detecting EPT hooksβ112Updated 3 years ago
- VAC3 (Valve Anti-Cheat 3) module emulatorβ98Updated 4 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.β603Updated 4 months ago
- Themida 3.x unpacking, unwrapping and devirtualization(future)β175Updated 2 years ago
- 09/2021 reversal of EasyAntiCheat driverβ219Updated 3 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.β136Updated 3 years ago
- β146Updated 4 years ago
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)β292Updated 9 months ago
- Native code virtualizer for x64 binariesβ486Updated 6 months ago
- Hooking kernel functions by abusing alignmentβ243Updated 4 years ago
- Stealthy way to hijack the existing game process handle within the game launcher (currently supports Steam and Battle.net). Achieve exterβ¦β98Updated 4 years ago
- π¨ Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.β111Updated last year
- compile-time control flow obfuscation using mbaβ184Updated last year
- Vectored Exception Handling Hooking Classβ159Updated 6 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.β289Updated 8 months ago
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasksβ369Updated 8 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uβ¦β60Updated last year
- x86 PE Mutatorβ219Updated 2 years ago
- β213Updated last week
- My reversing tools. Some custom, some not.β205Updated last year