thesecretclub / riscy-businessLinks
RISC-V Virtual Machine
☆242Updated last month
Alternatives and similar repositories for riscy-business
Users that are interested in riscy-business are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆208Updated last week
- An x86-64 Code Virtualizer☆274Updated 10 months ago
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆197Updated 3 weeks ago
- Native code virtualizer for x64 binaries☆497Updated 7 months ago
- Collection of hypervisor detections☆246Updated 10 months ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆210Updated 9 months ago
- Single header version of System Informer's phnt library.☆226Updated this week
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆251Updated 2 years ago
- ☆150Updated 2 months ago
- compile-time control flow obfuscation using mba☆189Updated 2 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆285Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆208Updated 4 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆146Updated 11 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆89Updated last month
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆124Updated last year
- x86-64 code/pe virtualizer☆198Updated 8 months ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆297Updated 9 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆188Updated 6 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆229Updated 3 years ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆369Updated 2 years ago
- Debugger Anti-Detection Benchmark☆347Updated 2 weeks ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆154Updated 4 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)☆301Updated 11 months ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated 7 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆176Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆154Updated 2 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆77Updated 4 months ago
- Reimplementation of Microsoft's Warbird obuscator☆133Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆296Updated last year