mrexodia / driver_unpacking
Ghetto user mode emulation of Windows kernel drivers.
ā134Updated 6 months ago
Alternatives and similar repositories for driver_unpacking:
Users that are interested in driver_unpacking are comparing it to the libraries listed below
- šŖ Different aproaches to detecting EPT hooksā105Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uā¦ā58Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.ā179Updated last year
- ā96Updated 7 years ago
- A devirtualization engine for Themida.ā100Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.ā86Updated last year
- Intercepting DeviceControl via WPPā133Updated 5 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallbackā71Updated 5 years ago
- VM devirtualization PoC based on AsmJit and llvmā113Updated 3 years ago
- x64 syscall caller in C++.ā88Updated 6 years ago
- Windows PDB parser for kernel-mode environment.ā95Updated 2 years ago
- PE-Dump-Fixerā105Updated 5 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exeā69Updated last year
- Kernel ReClassExā61Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.ā70Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyā82Updated 4 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Driversā57Updated 3 years ago
- Browse Page Tables on Windows (Page Table Viewer)ā197Updated 3 years ago
- VMProtect, VMP, Devirter, 3,5ā106Updated 2 years ago
- a minimalistic windows hypervisor for amd processorsā106Updated 2 years ago
- Obfuscate calls to imports by patching in stubsā67Updated 3 years ago
- Disks for DMAā104Updated 3 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)ā57Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscatorsā70Updated 2 years ago
- ā152Updated 5 years ago
- Attempts to decrypt JM Xorstr in some x64 binariesā53Updated 2 years ago
- x64 Windows implementation of virtual-address to physical-address translationā40Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.ā80Updated 4 years ago
- Resolve DOS MZ executable symbols at runtimeā95Updated 3 years ago
- ā141Updated 4 years ago