bieljtvz
an eternal apprentice in programming, always wanting more knowledge. Currently looking to know the functionality of kernel executions.
bieljtvz's Stars
LordNoteworthy/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
JustasMasiulis/lazy_importer
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
xoreaxeaxeax/REpsych
Psychological warfare in reverse engineering
can1357/ByePg
Defeating Patchguard universally for Windows 8, Windows 8.1 and all versions of Windows 10 regardless of HVCI.
changeofpace/VivienneVMM
VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.
btbd/umap
UEFI bootkit for driver manual mapping
donnaskiez/ac
kernel mode anti cheat
MellowNight/AetherVisor
Memory hacking library powered by AMD SVM
adspro15/km-um-communication
A somewhat wide collection of various kernelmode-usermode communication methods in one repository (mainly just for learning purposes).
Xyrem/Yumekage
Demo proof of concept for shadow regions, and implementation of HyperDeceit.
vmcall/owned_alignment
Hooking kernel functions by abusing alignment
haram/splendid_implanter
BattlEye compatible injector, done completely from user-mode, project by secret.club
Oliver-1-1/GhostMapper
VollRagm/PTView
Browse Page Tables on Windows (Page Table Viewer)
momo5502/hypervisor
Hypervisor with EPT hooking support.
ekknod/acdrv
base for testing
EBalloon/Rw-No-Attach
radiantly/Invisiwind
An application that allows you to hide certain windows when sharing your full screen
thesecretclub/callout-poc
Deputation/hygieia
Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.
wbaby/DoubleCallBack
tanduRE/AvastHV
Hooking SSDT with Avast Internet Security Hypervisor
nikisalli/esp32-minecraft-server
an esp32 based minecraft server!
KANKOSHEV/Detect-HiddenThread-via-KPRCB
Detect removed thread from PspCidTable.
kila58/qemu-patched
QEMU patched to avoid detection from various anticheats such as Battleye/EAC
illegal-instruction-co/EasySafe
Known ring3 memory protections that can be handled at a simple level.
estimated1337/executor
fecurity executor from factory
OrangeDoggo/dayz-external-sdk
External SDK for DayZ. Can be easily changed for internal use.
Stickey21/zgui
zxvnme's graphical user interface
oppsystem/connect_string
A string to connect with system