tandasat / hvextLinks
The Windbg extensions to study Hyper-V on Intel and AMD processors.
☆169Updated 4 months ago
Alternatives and similar repositories for hvext
Users that are interested in hvext are comparing it to the libraries listed below
Sorting:
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆160Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆115Updated last week
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆161Updated 2 years ago
- ☆148Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆246Updated 3 years ago
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆115Updated last year
- ☆62Updated 11 months ago
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆95Updated 4 years ago
- Hyper-V related resources☆31Updated last year
- Helpful WinDBG command for kernel debugging☆28Updated 5 years ago
- ☆93Updated last year
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆243Updated 3 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆87Updated 5 years ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated 3 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆86Updated 3 months ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- ☆149Updated 2 years ago
- Python bindings for the Icicle emulator.☆41Updated 2 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆258Updated 3 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 months ago
- ☆85Updated 10 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Updated 3 weeks ago
- An application to view and filter pool allocations from a dmp file on Windows 10 RS5+.☆149Updated 2 years ago
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆63Updated last year
- Different tools for Microsoft Hyper-V researching☆64Updated last month
- ☆157Updated 3 weeks ago