tanduRE / AvastHVView external linksLinks
Hooking SSDT with Avast Internet Security Hypervisor
☆115Apr 6, 2019Updated 6 years ago
Alternatives and similar repositories for AvastHV
Users that are interested in AvastHV are comparing it to the libraries listed below
Sorting:
- ☆15Oct 7, 2020Updated 5 years ago
- kernel-mode TDI client which can send and receive HTTP requests☆56Jun 9, 2018Updated 7 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Mar 30, 2019Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆87Apr 3, 2019Updated 6 years ago
- ☆185May 5, 2019Updated 6 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆460Feb 18, 2021Updated 4 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Aug 3, 2023Updated 2 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- usermode standalone kernel interface☆111Jul 9, 2018Updated 7 years ago
- Discarded Section Manual Map☆68Jun 18, 2020Updated 5 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- ☆99Oct 6, 2017Updated 8 years ago
- Windows Manipulation Library (x64, User/Kernelmode)☆77Oct 4, 2018Updated 7 years ago
- Modify process handle permissions☆61Nov 30, 2016Updated 9 years ago
- Analyze PatchGuard☆56Aug 19, 2018Updated 7 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- bypass CRC☆12May 3, 2018Updated 7 years ago
- The kernel mode Standard Template Library Template☆19Feb 22, 2020Updated 5 years ago
- UEFI bootkit for driver manual mapping☆583Jan 1, 2024Updated 2 years ago
- A native hypervisor designed for the Windows operating system☆125Mar 6, 2021Updated 4 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆160Oct 20, 2024Updated last year
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 7 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆87Jun 16, 2015Updated 10 years ago
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆131Aug 10, 2017Updated 8 years ago
- driver manual mapper (outdated/for educational purposes)☆114May 17, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- driver mapper / capcom wrapper☆228Oct 29, 2019Updated 6 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆118Mar 30, 2018Updated 7 years ago
- Kernel Pool Monitor☆127Mar 6, 2022Updated 3 years ago
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆232Jul 26, 2020Updated 5 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 6 years ago
- advanced solana trading bot on pumpfun. top solana sniper trading bot enhanced solana copy trading bot gRPC shrdstream frontrunning front…☆446Sep 25, 2025Updated 4 months ago
- The Grimoire Hypervisor solution for x86 Processors with experimental nested virtualization support. Remastering with Rust in progress.☆606Feb 1, 2026Updated 2 weeks ago
- kHypervisor is a lightweight bluepill-like nested VMM for Windows, it provides and emulating a basic function of Intel VT-x☆443Nov 29, 2021Updated 4 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆228Nov 24, 2017Updated 8 years ago
- ☆28Sep 29, 2020Updated 5 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆239Nov 6, 2019Updated 6 years ago