nevioo1337 / VMHideLinks
Bypasses VMProtect's VMWare & VMWare Tools detection trough user-mode API hooks.
☆14Updated 10 months ago
Alternatives and similar repositories for VMHide
Users that are interested in VMHide are comparing it to the libraries listed below
Sorting:
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆51Updated 3 years ago
- ☆30Updated 8 months ago
- ☆70Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated last year
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆57Updated 5 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆27Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- ☆46Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆53Updated 7 months ago
- ☆30Updated 3 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆36Updated 7 months ago
- cr3 shuffle driver☆42Updated last year
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆20Updated 2 months ago
- ☆25Updated last year
- ☆44Updated 11 months ago
- Translate virtual addresses to physical addresses from usermode.☆37Updated last year
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆12Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago
- ☆20Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆19Updated last year
- Extracts eac's driver at runtime without it touching the disk.☆33Updated last month
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆70Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- ☆12Updated last year