x86-64 virtual machine and disassembler
☆148Nov 23, 2019Updated 6 years ago
Alternatives and similar repositories for x64-vm
Users that are interested in x64-vm are comparing it to the libraries listed below
Sorting:
- C++17 PE manualmapper☆442Oct 2, 2021Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- VT-based PCI device monitor (SPI)☆158Oct 29, 2020Updated 5 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- Communication via callback☆73Oct 9, 2019Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Oct 14, 2018Updated 7 years ago
- C++ graphics kernel subsystem hook☆562Jan 11, 2021Updated 5 years ago
- init☆14Mar 16, 2020Updated 6 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆51Jan 15, 2021Updated 5 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Aug 7, 2020Updated 5 years ago
- Using C++ STL on Windows kernle development☆91Feb 21, 2019Updated 7 years ago
- easy to use vtable hook with RTTI support☆23Nov 12, 2019Updated 6 years ago
- x64 usermode rootkit☆212Apr 11, 2018Updated 7 years ago
- BattlEye x64 usermode injector☆66Mar 20, 2019Updated 7 years ago
- ☆19Jun 20, 2019Updated 6 years ago
- Hooking kernel functions by abusing alignment☆249Jan 5, 2021Updated 5 years ago
- Open Anti Cheat☆27Jul 16, 2022Updated 3 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆369Mar 15, 2015Updated 11 years ago
- Tools made for my Hyper-V blog series @ https://foxhex0ne.blogspot.com/☆58Jun 21, 2020Updated 5 years ago
- A simple DLL that can intercept HID messages and pass them on to the real HID DLL, while logging the data.☆23Oct 3, 2014Updated 11 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- Elevation of privilege detector based on HyperPlatform☆124Mar 5, 2017Updated 9 years ago
- Intercepting DeviceControl via WPP☆138Nov 18, 2019Updated 6 years ago
- Virtual Machine Introspection, Tracing & Debugging☆597Feb 22, 2022Updated 4 years ago
- Hypervisor-based debugger☆191Dec 2, 2020Updated 5 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆109Apr 24, 2020Updated 5 years ago
- ☆185May 5, 2019Updated 6 years ago
- core of pkn game hacking project. Including mainly for process management, memory management, and DLL injecttion. Also PE analysis, windo…☆68Mar 2, 2019Updated 7 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆241Nov 6, 2019Updated 6 years ago
- win10 pgContext dynamic dump (btc version)☆110Jan 15, 2020Updated 6 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆65Jun 19, 2019Updated 6 years ago
- x64 assembler library☆31Jun 7, 2024Updated last year
- by others☆40Jan 28, 2018Updated 8 years ago