Simple VM based x86 PE (portable exectuable) protector.
☆367Mar 15, 2015Updated 10 years ago
Alternatives and similar repositories for rewolf-x86-virtualizer
Users that are interested in rewolf-x86-virtualizer are comparing it to the libraries listed below
Sorting:
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆127Dec 3, 2022Updated 3 years ago
- Simple tool to bundle windows DLLs with PE executable☆117Mar 13, 2015Updated 10 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆1,002Jan 17, 2023Updated 3 years ago
- x86 Binary Code Virtualization Tool☆224Feb 7, 2025Updated last year
- ☆481Nov 2, 2016Updated 9 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Mar 15, 2015Updated 10 years ago
- Pe-protector protects executable files.☆52Jul 26, 2021Updated 4 years ago
- 🛡️ Obfuscator, Encryption, Junkcode, Anti-Debug, PE protection/modification☆524Jan 25, 2018Updated 8 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆443Nov 29, 2021Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆632Mar 19, 2019Updated 6 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- PE permutation library☆278Apr 8, 2023Updated 2 years ago
- RootKit & Cheat Scanner - Windows☆225Aug 9, 2019Updated 6 years ago
- IntelVT-X nice feature -> tool☆95Jul 2, 2014Updated 11 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,358Jan 22, 2022Updated 4 years ago
- VMProtect OD Plugin☆95Apr 16, 2016Updated 9 years ago
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- x86/x64 manual mapping injector using the JUCE library☆89Jun 29, 2020Updated 5 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Mar 17, 2019Updated 6 years ago
- TLB splitting VMM☆170May 17, 2016Updated 9 years ago
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- x86-64 virtual machine and disassembler☆147Nov 23, 2019Updated 6 years ago
- Hypervisor-based debugger☆191Dec 2, 2020Updated 5 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- VMProtect 3.x Anti-debug Method Improved☆652May 11, 2019Updated 6 years ago
- kernel exploitation helper class☆77Nov 26, 2016Updated 9 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- Decompiler for Code Virtualizer 1.3.8 (Oreans)☆88Oct 3, 2012Updated 13 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Jan 13, 2016Updated 10 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,728Nov 24, 2023Updated 2 years ago