momo5502 / hypervisorLinks
π§ͺ Hypervisor with EPT hooking support.
β249Updated this week
Alternatives and similar repositories for hypervisor
Users that are interested in hypervisor are comparing it to the libraries listed below
Sorting:
- alternative smm driver for ryzen motherboardsβ155Updated 9 months ago
- Collection of hypervisor detectionsβ247Updated 10 months ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.β285Updated 2 years ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilitiesβ307Updated 5 months ago
- Ghetto user mode emulation of Windows kernel drivers.β145Updated 9 months ago
- memory introspection and reverse engineering hypervisor powered by leveraging Hyper-Vβ268Updated 3 weeks ago
- Emulate Drivers in RING3 with self context mapping or unicornβ345Updated 2 years ago
- Debugger Anti-Detection Benchmarkβ348Updated 3 weeks ago
- IDA Pro plugin to make bitfield accesses easier to grepβ243Updated this week
- VAC3 (Valve Anti-Cheat 3) module emulatorβ100Updated 4 years ago
- β229Updated last month
- Kernel driver for detecting Intel VT-x hypervisors.β189Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uβ¦β61Updated last year
- A devirtualization engine for Themida.β100Updated last year
- The most powerful and customizable binary pattern scannerβ241Updated 3 years ago
- πͺ Different approaches for EPT hook detectionβ117Updated last week
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.β137Updated 3 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixerβ8Updated 3 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.β295Updated last year
- Hooking kernel functions by abusing alignmentβ245Updated 4 years ago
- Browse Page Tables on Windows (Page Table Viewer)β213Updated 3 years ago
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with seβ¦β182Updated 3 years ago
- β148Updated 4 years ago
- Hooking Windows' exception dispatcher to protect process's PML4β188Updated 6 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withouβ¦β217Updated 9 months ago
- An x86-64 Code Virtualizerβ277Updated 10 months ago
- My reversing tools. Some custom, some not.β207Updated last year
- x86-64 code/pe virtualizerβ198Updated 8 months ago
- A x86_64 software emulatorβ142Updated last week
- Windows inline hooking tool.β281Updated 6 years ago