PatchGuard Research
☆304Oct 6, 2018Updated 7 years ago
Alternatives and similar repositories for PgResarch
Users that are interested in PgResarch are comparing it to the libraries listed below
Sorting:
- Windbg extension to find PatchGuard pages☆123Jun 24, 2014Updated 11 years ago
- nyā☆70Oct 16, 2015Updated 10 years ago
- Hypervisor based tool for monitoring system register accesses.☆154Sep 13, 2018Updated 7 years ago
- pseudo-code to show how to disable patchguard with win10☆294Jan 13, 2018Updated 8 years ago
- Universal PatchGuard and Driver Signature Enforcement Disable☆862Mar 29, 2019Updated 6 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆443Nov 29, 2021Updated 4 years ago
- ☆125May 23, 2020Updated 5 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,358Jan 22, 2022Updated 4 years ago
- ☆116Oct 1, 2019Updated 6 years ago
- Turn off PatchGuard in real time for win7 (7600) ~ later☆1,037Apr 21, 2022Updated 3 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- 内核级ARK工具。☆62Aug 1, 2016Updated 9 years ago
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆902Nov 21, 2019Updated 6 years ago
- Minimalistic VT-x hypervisor with hooks☆931Oct 18, 2019Updated 6 years ago
- Intel VT-x based hypervisor aiming to provide a thin VM-exit filtering platform on Windows.☆1,728Nov 24, 2023Updated 2 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- Elevation of privilege detector based on HyperPlatform☆123Mar 5, 2017Updated 8 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆466Apr 17, 2018Updated 7 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆118Jul 11, 2017Updated 8 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- Windows x64 Driver Signature Enforcement Overrider☆796Dec 4, 2018Updated 7 years ago
- Hide Driver By MiProcessLoaderEntry☆294May 17, 2019Updated 6 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆200Oct 19, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- Hooking kernel functions by abusing alignment☆248Jan 5, 2021Updated 5 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆114Aug 28, 2016Updated 9 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆465Feb 18, 2021Updated 5 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,193Aug 1, 2019Updated 6 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆634Jul 7, 2017Updated 8 years ago
- IntelVT-X nice feature -> tool☆95Jul 2, 2014Updated 11 years ago
- Research on Windows Kernel Executive Callback Objects☆316Feb 22, 2020Updated 6 years ago