sammwyy / NoVMLinks
A tool to hide virtual machines (VMs) from malicious actors.
☆32Updated 10 months ago
Alternatives and similar repositories for NoVM
Users that are interested in NoVM are comparing it to the libraries listed below
Sorting:
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆33Updated last year
- PE Header (.rdata,.data,.text) obsfucation☆38Updated 3 years ago
- A Dynamic Study Vmprotect 1.x-1.9X Unpacking Toolkit, Recovery OEP, FIX PE, IAT and bypass protection with custom Loader and interceptor …☆34Updated 2 years ago
- ☆46Updated 7 months ago
- Handle access elevation by DKOM☆12Updated 2 years ago
- codecave hook reverse engineering toolkit.☆37Updated last year
- Extract sequences of instructions to be executed exclusively on a remote server☆31Updated last month
- ☆52Updated 3 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆18Updated 2 years ago
- a always updated and undetected temp spoof driver☆27Updated 5 months ago
- Using ioctl major function swaps to "spoof" the ARP table☆16Updated last year
- PoC over some VMP features☆23Updated last month
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆23Updated 2 years ago
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆44Updated last year
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆14Updated 6 months ago
- Fixes the "Device\Nal is already in use" error on kdmapper.☆20Updated 2 years ago
- Anti Suspend and Detect Detaching from debuggers.☆16Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago
- C/C++ antidebugging library for Windows☆37Updated 3 weeks ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆72Updated last month
- Translate virtual addresses to physical addresses from usermode.☆50Updated last year
- Hardware ID☆54Updated 3 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆30Updated 2 years ago
- POC Windows kernel driver that spoofs threads for NMI callbacks on x86-64.☆23Updated 5 months ago
- Collection of Cheat dumps for Research and Detection.☆16Updated last month
- A devirtualization engine for Themida.☆100Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- proof of concept of user-mode anti-breakpoint technique☆16Updated 2 years ago
- Simple proof of concept kernel mode driver hooking tpm.sys dispatch to randomize any public key reads☆219Updated last year
- PAGE_GUARD based hooking library☆48Updated 3 years ago