memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V
☆565Nov 15, 2025Updated 3 months ago
Alternatives and similar repositories for hyper-reV
Users that are interested in hyper-reV are comparing it to the libraries listed below
Sorting:
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆409Apr 19, 2025Updated 10 months ago
- Collection of hypervisor detections☆296Sep 25, 2024Updated last year
- Efficient general mixed boolean-arithmetic (MBA) simplifier☆124Updated this week
- binary instrumentation, analysis, and patching framework☆100Feb 20, 2026Updated last week
- Lightweight Intel VT-x Hypervisor.☆663Dec 17, 2024Updated last year
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆252Feb 19, 2026Updated last week
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆372Feb 26, 2025Updated last year
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- kernel mode anti cheat☆637Aug 4, 2024Updated last year
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆766Sep 29, 2025Updated 5 months ago
- Kernel Level NMI Callback Blocker☆165Sep 27, 2025Updated 5 months ago
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆149Sep 3, 2023Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- A minimalistic educational hypervisor for Windows on AMD processors.☆531Mar 3, 2025Updated 11 months ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆642Jan 23, 2025Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆93Oct 26, 2025Updated 4 months ago
- ☆223Mar 11, 2023Updated 2 years ago
- x86-64 Automated test data generator☆26Aug 18, 2025Updated 6 months ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆314May 31, 2023Updated 2 years ago
- Standard Kernel Library for Windows manipulation in C++☆199Jun 18, 2025Updated 8 months ago
- 无痕hook探测☆45Aug 6, 2025Updated 6 months ago
- ☆272Sep 2, 2025Updated 5 months ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆379Jun 3, 2023Updated 2 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆103Dec 8, 2024Updated last year
- Hijacking Hyper-V at Runtime with DDMA☆76Aug 13, 2025Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆273Dec 13, 2025Updated 2 months ago
- ☆68Sep 16, 2022Updated 3 years ago
- nmi stackwalking + module verification☆162Dec 28, 2023Updated 2 years ago
- The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.☆613Updated this week
- ☆360May 11, 2025Updated 9 months ago
- base for testing☆186Sep 28, 2024Updated last year
- x86-64 user mode emulation using Zydis☆72Sep 12, 2025Updated 5 months ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆225Jul 17, 2024Updated last year
- Titan is a VMProtect devirtualizer☆118Mar 6, 2024Updated last year
- ☆423Jan 1, 2025Updated last year