Материалы к статье "Препарируем Hyper V"
☆14Nov 5, 2014Updated 11 years ago
Alternatives and similar repositories for x14.11-coding-hyperv
Users that are interested in x14.11-coding-hyperv are comparing it to the libraries listed below
Sorting:
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Apr 10, 2013Updated 12 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆14Jun 30, 2015Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- A Rust library for function hooking that supports both 32 and 64 bit☆17Aug 1, 2021Updated 4 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Implementation of a thin hypervisor☆43May 20, 2016Updated 9 years ago
- sample bypass anti-anti-debug tool by race condition☆27Aug 2, 2022Updated 3 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Sep 12, 2016Updated 9 years ago
- ☆19Mar 16, 2017Updated 8 years ago
- ☆61Feb 8, 2016Updated 10 years ago
- ☆21Oct 4, 2015Updated 10 years ago
- Intel learning hypervisor and some extend function☆23Aug 23, 2025Updated 6 months ago
- WinEoP Exploitation Framework☆25Jan 7, 2016Updated 10 years ago
- Process / thread-level system call tracer for Windows 7 / 8 / 2008 / 2012☆21May 19, 2015Updated 10 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- Kernel Address Space Layout Randomization (KASLR) Recovery Software☆98Nov 26, 2016Updated 9 years ago
- A project to learn about malware and c++ coding☆23Sep 5, 2015Updated 10 years ago
- Simple standalone bundle of NT core APIs☆25Mar 7, 2016Updated 9 years ago
- Development drivers for Linux Integration Services☆34Nov 28, 2022Updated 3 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- Software for monitoring users' file access☆52Aug 1, 2016Updated 9 years ago
- My UEFI security talk on ZeroNights 2015☆58Dec 13, 2015Updated 10 years ago
- A small utility to connect a TCP socket to a Windows named pipe. It can be used, for exemple, to capture network data with tcpdump on Lin…☆42May 2, 2012Updated 13 years ago
- Fuzzer☆43Oct 18, 2014Updated 11 years ago
- An application for obtaining, dumping and modifying token from user land.☆26Nov 21, 2015Updated 10 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34May 15, 2022Updated 3 years ago
- A fuzz job for ClamAV☆32Jun 13, 2016Updated 9 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- ☆64Oct 24, 2015Updated 10 years ago
- ☆28Nov 20, 2017Updated 8 years ago
- ☆39Oct 21, 2016Updated 9 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- ☆89Oct 14, 2018Updated 7 years ago
- Stores Chromium Channel ID private keys in an Intel SGX enclave.☆33Jun 13, 2016Updated 9 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- Test code only. Not reliable for actual use.☆63Jan 1, 2016Updated 10 years ago