tandasat / SimpleSvmHookLinks
SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.
☆426Updated 4 years ago
Alternatives and similar repositories for SimpleSvmHook
Users that are interested in SimpleSvmHook are comparing it to the libraries listed below
Sorting:
- A minimalistic educational hypervisor for Windows on AMD processors.☆458Updated 6 months ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆431Updated 3 years ago
- The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.☆562Updated this week
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆612Updated 6 years ago
- System call hook for Windows 10 20H1☆494Updated 4 years ago
- C++ graphics kernel subsystem hook☆535Updated 4 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆612Updated 7 months ago
- KSOCKET provides a very basic example how to make a network connections in the Windows Driver by using WSK☆526Updated 3 years ago
- Lightweight type-1 hypervisor offering a foundation for building advanced security-focused functionality.☆271Updated 8 months ago
- Simple Intel VT-x hypervisor☆331Updated last year
- Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.☆893Updated 5 years ago
- UEFI bootkit for driver manual mapping☆570Updated last year
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆812Updated 5 years ago
- Windows inline hooking tool.☆284Updated 6 years ago
- Lightweight Intel VT-x Hypervisor.☆603Updated 8 months ago
- Detecting execution of kernel memory where is not backed by any image file☆260Updated 7 years ago
- Windows NT x64 syscall fuzzer☆624Updated 2 months ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆316Updated 5 years ago
- C++ STL in the Windows Kernel with C++ Exception Support☆424Updated 2 years ago
- C++17 PE manualmapper☆376Updated 3 years ago
- Hooking kernel functions by abusing alignment☆245Updated 4 years ago
- driver mapper / capcom wrapper☆222Updated 5 years ago
- Simple x86-64 VT-x Hypervisor with EPT Hooking☆913Updated 2 years ago
- PatchGuard Research☆303Updated 6 years ago
- pseudo-code to show how to disable patchguard with win10☆296Updated 7 years ago
- Driver that uses network sockets to communicate with client and read/ write protected process memory.☆572Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆226Updated 7 years ago
- A library to manipulate physical memory from usermode.☆296Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆554Updated 8 months ago
- Research on Windows Kernel Executive Callback Objects☆307Updated 5 years ago