opcode86 / AntiDebug-AntiVM
Different methods to detect a virtualized environment or potential debugging
☆9Updated 2 years ago
Alternatives and similar repositories for AntiDebug-AntiVM:
Users that are interested in AntiDebug-AntiVM are comparing it to the libraries listed below
- Hiding a system thread against conventional means of detection☆40Updated 4 years ago
- ☆132Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆121Updated 10 months ago
- Compile-Time Calls Obfuscator for C++14+☆43Updated last year
- ☆35Updated 7 months ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆55Updated last year
- Hide processes, files, services in Windows ring3☆24Updated 10 months ago
- A basic demonstration of directly overwriting paging structures for physical memory r/w and interprocess memory copy☆85Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆118Updated 2 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Updated 5 years ago
- Based on physmeme☆69Updated 2 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆80Updated 6 years ago
- DSE & PG bypass via BYOVD attack☆50Updated last year
- This project can bypass most of the AC except for some perverts that enable VT to monitor page tables☆41Updated 11 months ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆111Updated 3 years ago
- Example of reading process memory through kernel special APC☆103Updated 2 years ago
- manual map unsigned driver over signed memory☆186Updated last year
- Standard Kernel Library for Windows manipulation in C++☆141Updated 5 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆167Updated last year
- Use RTCore64 to map your driver on windows 11.☆105Updated 2 months ago
- browse microsoft driver server for potentially vulnerable drivers☆17Updated 11 months ago
- Protect your process like ntoskrnl.exe☆16Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- driver manual mapper powered by https://github.com/estimated1337/lenovo_exec☆110Updated 2 years ago
- A Memory Read And Write the Hide Driver☆66Updated 4 years ago
- InfinityHook 支持Win7 到 Win11 最新版本,虚拟机环境及物理机环境☆56Updated 6 months ago
- 让Etwhook再次伟大! Make InfinityHook Great Again!☆134Updated 3 years ago
- ☆40Updated 3 years ago