rich-ayr / phnt_nightly
Native API header files for the Process Hacker project (nightly).
☆26Updated this week
Alternatives and similar repositories for phnt_nightly:
Users that are interested in phnt_nightly are comparing it to the libraries listed below
- x64 assembler library☆31Updated 11 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆38Updated 2 years ago
- ☆27Updated last year
- A poc that abuses Enclave☆38Updated 2 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- ☆30Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆22Updated 9 months ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 3 years ago
- ntos shit☆24Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆49Updated 6 months ago
- Windows kernel driver template for cmkr (with testsigning).☆32Updated last year
- My research WIP bluepill hypervisor☆41Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Static Library For Windows Drivers☆33Updated 2 months ago
- Code virtualizer☆23Updated 8 years ago
- ☆22Updated last year
- Black Signature Driver☆23Updated last year
- Windows Console Monitor☆34Updated 5 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 2 years ago
- A bunch of architectural headers for i386 and AMD64☆36Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆34Updated last year
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 2 years ago