void-stack / Hypervisor-Detection
Detects virtual machines and malware analysis environments
☆117Updated 2 years ago
Alternatives and similar repositories for Hypervisor-Detection:
Users that are interested in Hypervisor-Detection are comparing it to the libraries listed below
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆112Updated last year
- ☆119Updated last year
- DSE & PG bypass via BYOVD attack☆41Updated 9 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆162Updated last year
- manual map unsigned driver over signed memory☆184Updated 9 months ago
- A devirtualization engine for Themida.☆94Updated 10 months ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆177Updated last year
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆120Updated 3 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆43Updated last year
- Windows PDB parser for kernel-mode environment.☆93Updated 2 years ago
- Example of reading process memory through kernel special APC☆101Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆176Updated 3 months ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆126Updated 11 months ago
- Obfuscate calls to imports by patching in stubs☆65Updated 3 years ago
- VMProtect, VMP, Devirter, 3,5☆105Updated last year
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆113Updated 7 months ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆66Updated last year
- ☆127Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆79Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆78Updated 3 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆43Updated 6 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆69Updated 2 years ago
- An x86-64 Code Virtualizer☆125Updated 3 months ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆67Updated 2 years ago
- PoC kernel to usermode injection☆73Updated 10 months ago
- State of the art DLL injector that took 20 minutes to make☆208Updated last year
- A library to assist with memory & code protection.☆53Updated 10 months ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆49Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated last year