tandasat / kraft_dinnerLinks
Tool to dump UEFI runtime drivers implementing runtime services for Windows
☆111Updated 5 years ago
Alternatives and similar repositories for kraft_dinner
Users that are interested in kraft_dinner are comparing it to the libraries listed below
Sorting:
- A native hypervisor designed for the Windows operating system☆125Updated 4 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Updated 2 years ago
- Intercepting DeviceControl via WPP☆135Updated 6 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆104Updated 5 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆101Updated 5 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆158Updated last year
- ☆68Updated 5 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆80Updated 3 years ago
- The sample DXE runtime driver demonstrating how to program DMA remapping.☆72Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆132Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Documenting system information classes and their uses☆56Updated 4 years ago
- Disks for DMA☆131Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆89Updated 2 years ago
- ☆51Updated 5 years ago
- VM devirtualization PoC based on AsmJit and llvm☆121Updated 4 years ago
- Header only wrapper around Hex-Rays API in C++20.☆168Updated last year
- x64 syscall caller in C++.☆93Updated 7 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆238Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆66Updated last year
- ☆99Updated 8 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- Шаблон полнофункционального драйвера и обёртки над ядерным API☆115Updated 9 years ago
- Translates WinDbg "dt" structure dump to a C structure☆134Updated 9 years ago
- A small tool for rapid enumeration of CPUID, and MSR fields.☆27Updated last year
- Parser for Microsoft Program Database (PDB) files☆77Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆192Updated 2 years ago