zhuhuibeishadiao / PatchGuardResearch
win10 pgContext dynamic dump (btc version)
☆102Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PatchGuardResearch
- ☆121Updated 4 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 5 years ago
- Intel Virtualization Technology demo☆65Updated 8 years ago
- Hide codes/data in the kernel address space.☆185Updated 3 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- ☆93Updated 7 years ago
- Collect different versions of Crucial modules.☆127Updated 4 months ago
- ☆108Updated 5 years ago
- A hypervisor hiding user-mode memory using EPT☆105Updated 6 years ago
- Windows Driver Kit Extesion Header (Undoc)☆132Updated 3 years ago
- hook msr by amd svm☆119Updated 4 years ago
- ayy debuger☆88Updated 8 months ago
- first commit☆57Updated 4 years ago
- VT Hook☆44Updated 4 months ago
- Another method to anti ThreadHideFromDebugger☆34Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆91Updated last year
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆73Updated 13 years ago
- Some garbage drivers written for getting started☆62Updated 4 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆66Updated 3 years ago
- 使用vt进行无痕hook,支持r3☆50Updated 5 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆101Updated 5 years ago
- An Ark tool project,run on Win7 x86/x64☆110Updated 7 years ago
- ☆45Updated 6 years ago
- ☆36Updated 7 years ago
- An Attempt to Bypass Memory Scanners By Misusing the ntdll.dll "RT" Section.☆95Updated 8 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆79Updated 5 years ago
- Page fault hook use ept (Intel Virtualization Technology)☆175Updated 8 years ago