tandasat / EopMonView external linksLinks
Elevation of privilege detector based on HyperPlatform
☆124Mar 5, 2017Updated 8 years ago
Alternatives and similar repositories for EopMon
Users that are interested in EopMon are comparing it to the libraries listed below
Sorting:
- Hypervisor based tool for monitoring system register accesses.☆153Sep 13, 2018Updated 7 years ago
- Detecting execution of kernel memory where is not backed by any image file☆262Jul 11, 2018Updated 7 years ago
- User-mode program parsing logs created by HyperPlatform☆18Aug 15, 2016Updated 9 years ago
- ☆17Mar 3, 2016Updated 9 years ago
- Lists work items being queued currently.☆14Jun 7, 2015Updated 10 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- ☆12Feb 19, 2017Updated 8 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 7 years ago
- just an lite AntiRootkit for interesting☆24Dec 9, 2015Updated 10 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆36Jul 21, 2014Updated 11 years ago
- Windbg extension to find PatchGuard pages☆123Jun 24, 2014Updated 11 years ago
- A hypervisor hiding user-mode memory using EPT☆107Jan 28, 2018Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Wow64 syscall hook☆42May 28, 2017Updated 8 years ago
- pass game protect☆12Apr 26, 2014Updated 11 years ago
- ☆15Jan 14, 2016Updated 10 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- A command line tool to load and unload a device driver.☆46Jun 10, 2017Updated 8 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,352Jan 22, 2022Updated 4 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- init☆14Mar 16, 2020Updated 5 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- createfile☆50Oct 27, 2015Updated 10 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Jan 7, 2013Updated 13 years ago
- Test code only. Not reliable for actual use.☆63Jan 1, 2016Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- AllMemPro☆46Jan 15, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/virtdbg☆99Jun 25, 2015Updated 10 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- An av windows engine with file guard and compress file enumator☆12Aug 25, 2018Updated 7 years ago
- PatchGuard Research☆304Oct 6, 2018Updated 7 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- Capstone disassembly/disassembler framework: Core (Arm, Arm64, M68K, Mips, PPC, Sparc, SystemZ, X86, X86_64, XCore) + bindings (Python, J…☆15May 18, 2019Updated 6 years ago