"Bypassing" HVCI via donor PFN swaps to modify read-only code pages. Call chained kernel functions (kCET and SLAT support), modify read-only code pages, and more.
☆105Mar 16, 2026Updated this week
Alternatives and similar repositories for BusterCall
Users that are interested in BusterCall are comparing it to the libraries listed below
Sorting:
- .data ptr swapper for newer win32k versions. (Supports Windows 11)☆38Jan 19, 2026Updated 2 months ago
- Stealth-focused Intel VT-x hypervisor base (EAC/BE/ACs/AVs).☆79Updated this week
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆36Jul 2, 2024Updated last year
- A minimalistic way to spoof return addresses without using exceptions☆18Jul 26, 2022Updated 3 years ago
- Binary lifter and deobfuscator using remill for x86_64 Windows binaries☆73Mar 10, 2026Updated last week
- Resolve offsets, gadgets and symbols from NTKernel☆56Jan 15, 2026Updated 2 months ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆54Mar 4, 2026Updated 2 weeks ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆91Feb 1, 2026Updated last month
- ☆95Oct 25, 2025Updated 4 months ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Dec 27, 2022Updated 3 years ago
- mash hypervisor host pml4☆17Jun 22, 2022Updated 3 years ago
- A better way to write shell code☆11May 28, 2021Updated 4 years ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Apr 13, 2025Updated 11 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆111Jan 18, 2026Updated 2 months ago
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated 11 months ago
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 3 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated 11 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆119Oct 15, 2024Updated last year
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- tests to catch some sloppy hv impls☆32Dec 17, 2025Updated 3 months ago
- ☆39Jun 10, 2023Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆61Oct 19, 2024Updated last year
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆35Mar 23, 2024Updated last year
- Various reverse engineering work on Windows☆22Feb 21, 2021Updated 5 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆77Sep 8, 2025Updated 6 months ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ☆65Feb 15, 2026Updated last month
- ☆54Mar 26, 2025Updated 11 months ago
- VMProtect2 Deobfuscation Tooling☆97Nov 12, 2025Updated 4 months ago
- Load Dll into Kernel space☆40Aug 23, 2022Updated 3 years ago
- Template for UEFI runtime drivers written in Rust with serial logging and debugging support.☆61Oct 9, 2020Updated 5 years ago
- A work in progress BOF/COFF loader in Rust☆50Mar 22, 2023Updated 2 years ago
- ☆25Apr 28, 2024Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆133Apr 26, 2023Updated 2 years ago
- ☆113Updated this week
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- nmi stackwalking + module verification☆164Dec 28, 2023Updated 2 years ago