• 02 March 2026 (1 messages)
  • @iM7752 #11236 05:18 PM, 02 Mar 2026
    Joined.
  • 03 March 2026 (1 messages)
  • @6825816325 #11237 02:27 PM, 03 Mar 2026
    Joined.
  • 05 March 2026 (8 messages)
  • @HyperDbgBot #11238 b o t 09:41 PM, 05 Mar 2026
    [discord] <kolie> o/ having issues with hyberdbg, watchdog timeout, critical structure corruption, hypervade define being inverted logic from what it should, !hide not working at all .
  • @HyperDbgBot #11239 b o t 09:50 PM, 05 Mar 2026
    [discord] <kolie> Not sure where to start, but I'd be willing to debug/test/contribute to get it working.
  • @HyperDbgBot #11240 b o t 09:51 PM, 05 Mar 2026
    [discord] <kolie> Got an app I'm trying to work with and as soon as I start it, the machine locks up. Sometimes when I load vmm I get lockup / watchdog blue screen.
  • @HyperDbgBot #11241 b o t 09:51 PM, 05 Mar 2026
    [discord] <kolie> I was hoping maybe something in hyperevade helped with the lockup.
  • @HyperDbgBot #11242 b o t 09:52 PM, 05 Mar 2026
    [discord] <kolie> !hide just basically says it can't work as soon as I try to load it.
  • @HyperDbgBot #11243 b o t 09:53 PM, 05 Mar 2026
    [discord] <kolie> !hide itself doesn't seem to work, it seems its global anyways I guess, when I looked at the code, even if I give it a pid, its enabled for everything, but I don't even get that far ( I'm fine if its global, just curious observations ).
  • @HyperDbgBot #11244 b o t 11:38 PM, 05 Mar 2026
    [discord] <kolie> I got transparent debugging enabled by taking out the logging null checks.
  • @HyperDbgBot #11245 b o t 11:39 PM, 05 Mar 2026
    [discord] <kolie> Got a watchdog timeout as soon as I started the program I want to work with.
  • 06 March 2026 (3 messages)
  • @quanqsim #11246 05:32 AM, 06 Mar 2026
    Joined.
  • @HyperDbgBot #11247 b o t 04:08 PM, 06 Mar 2026
    [discord] <unrustled.jimmies> [reply]: critical structure corruption seems like kpp/patchguard. did you disable it?
  • @HyperDbgBot #11248 b o t 04:54 PM, 06 Mar 2026
    [discord] <kolie> Yea patchguard off.
  • 07 March 2026 (1 messages)
  • @HyperDbgBot #11249 b o t 02:04 AM, 07 Mar 2026
    [discord] <unrustled.jimmies> can you upload the minidump?
  • 08 March 2026 (2 messages)
  • @HyperDbgBot #11251 b o t 12:49 AM, 08 Mar 2026
    [discord] <kolie> Not sure if it produces ill check
  • @ghvv188 #11252 07:03 AM, 08 Mar 2026
    Joined.
  • 09 March 2026 (1 messages)
  • @glavdiz #11253 07:00 AM, 09 Mar 2026
    Joined.
  • 13 March 2026 (1 messages)
  • @8653889750 #11258 08:18 PM, 13 Mar 2026
    Joined.
  • 14 March 2026 (2 messages)
  • @HyperDbgBot #11259 b o t 11:08 AM, 14 Mar 2026
    [discord] <__writecr4> used hyperdbg as a vital reference for this project here: https://github.com/zer0condition/Ophion

    seen some people asking if anyone has isolated just the hv from the hyperdbg project so going to drop it here, hope they find it helpful
    GitHub - zer0condition/Ophion: Stealth-focused Intel VT-x hypervisor (EAC/BE/ACs/AVs).

    Stealth-focused Intel VT-x hypervisor (EAC/BE/ACs/AVs). - zer0condition/Ophion

  • @379751911 #11260 04:16 PM, 14 Mar 2026
    Joined.
  • 15 March 2026 (2 messages)
  • @HyperDbgBot #11261 b o t 07:47 PM, 15 Mar 2026
    [discord] <rayanfam> [reply]: Interesting. Thanks for sharing
  • @HyperDbgBot #11262 b o t 07:52 PM, 15 Mar 2026
    [discord] <rayanfam> This is also an interesting analysis, seems that they directly used HyperDbg in their project:
    https://github.com/RD945/hypervisor-crack-audit
    GitHub - RD945/hypervisor-crack-audit: Security analysis of the hypervisor drm method used to bypass denuvo. Reverse engineering of the driver loaders and boot components using Ghidra

    Security analysis of the hypervisor drm method used to bypass denuvo. Reverse engineering of the driver loaders and boot components using Ghidra - RD945/hypervisor-crack-audit

  • 18 March 2026 (2 messages)
  • @michael_srv #11263 02:18 PM, 18 Mar 2026
    Joined.
  • @kkkboy3331 #11264 03:06 PM, 18 Mar 2026
    Joined.
  • 19 March 2026 (21 messages)
  • @CheapNow #11265 01:17 AM, 19 Mar 2026
    I hope no one is stupid enough to download the above. It is like botted and leads to a malicious source. Why else would you funnel people to download a source away from a platform which sole purpose is to host source code.
  • What?
  • @CheapNow ↶ Reply to #11266 #11267 01:18 AM, 19 Mar 2026
    You dont see the git link>
  • This one?
  • @CheapNow #11269 01:19 AM, 19 Mar 2026
    Yup
  • I didn't download it, just read the markdown file.
  • @HughEverett #11271 01:20 AM, 19 Mar 2026
    But thanks for informing us about it 👍
  • @HyperDbgBot #11273 b o t 04:19 PM, 19 Mar 2026
    [discord] <zer0condition> [reply]: i don’t think you understand that this is an article/blog post which is about reverse engineering a certain cracking method used in Denuvo-protected games, also the person who posted it is a lead developer/founding member of HyperDbg
  • I just read it. I didn't download anything. The work itself was really good.
  • @HughEverett #11275 04:26 PM, 19 Mar 2026
    The only mistake (in case of HyperDbg) that I noticed was this one:
  • @HughEverett #11276 04:27 PM, 19 Mar 2026
    Right now, we just support VMX, not SVM.
  • @HyperDbgBot #11277 b o t 04:27 PM, 19 Mar 2026
    [discord] <zer0condition> [reply]: yep i havent read up on it personally, its not mine, the project posted above it (Ophion) is
  • I think he meant this file, not Ophion:
  • @HughEverett #11279 04:28 PM, 19 Mar 2026
    But again, I don't know, I didn't download anything.
  • @HyperDbgBot #11280 b o t 04:29 PM, 19 Mar 2026
    [discord] <zer0condition> yep got it, i was just clarifying because he seemed to have misunderstood what rayanfam had posted
  • @HughEverett #11281 04:29 PM, 19 Mar 2026
    BTW, I also checked Ophion, it was really an impressive project.
  • Yes, that's also my discord account.
  • @HyperDbgBot #11283 b o t 04:29 PM, 19 Mar 2026
    [discord] <zer0condition> appreciate the kind works, it still has alot of potential and future work to be put into
  • @HyperDbgBot #11284 b o t 04:30 PM, 19 Mar 2026
    [discord] <zer0condition> words*
  • Also, FYI we have a project called HyperEvade (which is currently disabled because anti viruses flag it as malicious probably because of certain string), but in case if you were interested, feel free to add codes there. Or maybe we could also add some of your codes to HyperDbg in the future.
  • and yes, that's certainly a broad area of research and development. Nice work. 👍
  • 20 March 2026 (105 messages)
  • @ghvv188 ↶ Reply to #11286 #11287 01:18 AM, 20 Mar 2026
    Can you explain in detail, if is possible, what to turn off before starting hyperdbg, because I turned off a lot things but still complained about something
  • @HappyEveryDay000 #11288 04:41 AM, 20 Mar 2026
    Joined.
  • @appkil #11289 06:55 AM, 20 Mar 2026
    Joined.
  • I saw it intercepting only the next call of rdtsc to bypass time-based detections, won't this be detected easily by calling rdtsc twice or by adding some other instructions before calling rdtsc
  • @getting458 #11291 12:25 PM, 20 Mar 2026
    RDTSC timing countermeasure
  • @getting458 #11292 12:25 PM, 20 Mar 2026
    Is this tool already included?
  • Hey,
    I was preparing an Intel Core Ultra 2xx for HyperDbg and it seems there are a lot of things changed there. There is also device guard that needs to be disabled to disable VBS so it took us a bit of time to run HyperDbg but we finally made it. Are you running on Core Ultra 2XX processor?
  • Or is it a different processor/problem?
  • @HyperDbgBot #11295 b o t 01:26 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: the classic pattern is rdtsc -> cpuid -> rdtsc, that's what hvdetecc, VMAware, and anti-cheats actually run, trapping the next RDTSC defeats it with zero perf cost
  • @HyperDbgBot #11296 b o t 01:26 PM, 20 Mar 2026
    [discord] <zer0condition> trapping every RDTSC unconditionally is a non-starter, TSC reads happen constantly (spinlocks, scheduler, profiling), the perf hit itself becomes a detection vector
  • @HyperDbgBot #11297 b o t 01:27 PM, 20 Mar 2026
    [discord] <zer0condition> double RDTSC after CPUID? first gets compensated, second gets raw, but youd need to know the expected delta on bare metal which varies by CPU/microcode/P-state, statistical attack that needs a baseline
  • @HyperDbgBot #11298 b o t 01:27 PM, 20 Mar 2026
    [discord] <zer0condition> adding nops or other instructions? the trap disarms on any intervening exit (interrupt, NMI, etc), not just RDTSC, on a live system with interrupts firing constantly, more instructions = higher chance something else disarms it
  • @HyperDbgBot #11299 b o t 01:27 PM, 20 Mar 2026
    [discord] <zer0condition> detector cant tell the difference
  • @HyperDbgBot #11300 b o t 01:28 PM, 20 Mar 2026
    [discord] <zer0condition> but nobodys running these attacks in practice afaik, current approach passes everything tested
  • @HyperDbgBot #11301 b o t 01:29 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: yes, that among other things, most detection mechanisms employed by anti-cheats, anti-malware, etc, are to be covered, currently EAC is the main testing environment since it has one of the most strict hypervisor detection mechanisms for commercial products and it passes it
  • @HyperDbgBot #11302 b o t 01:30 PM, 20 Mar 2026
    [discord] <zer0condition> Hyperion by Byfron technologies also have interesting mechanisms from what ive heard, will be looking at that next
  • I was wondering how making VBS mandatory on newer systems (enabled by default) affects projects that attempt to detect hypervisors using general techniques like RDTSC or CPUID. Are these general mitigation (e.g., RDTSC/CPUID) methods still significant in malware and anti cheats?
  • @HughEverett #11304 01:33 PM, 20 Mar 2026
    Because if there is a VBS running inside a machine then by default we should expect RDTSC/CPUID.
  • @HyperDbgBot #11305 b o t 01:34 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: VBS on by default changes the baseline, theres always a hypervisor now, so the usual "detect any hypervisor" becomes useless, every modern Windows box would trigger it
  • Exactly
  • @HyperDbgBot #11307 b o t 01:35 PM, 20 Mar 2026
    [discord] <zer0condition> detection shifts to finding a rogue hypervisor on top of Hyper-V, anti-cheats have to whitelist Hyper-V's signature and look for nested layers, or use hypercalls to verify it's actually microsoft's code, generic CPUID/RDTSC checks just detect VBS doing its job
  • @HyperDbgBot #11308 b o t 01:36 PM, 20 Mar 2026
    [discord] <zer0condition> still matters for non-VBS systems (gaming rigs with VBS off for performance) and nested scenarios hiding under Hyper-V
  • @HyperDbgBot #11309 b o t 01:36 PM, 20 Mar 2026
    [discord] <zer0condition> but yeah, relevance shrinks as VBS adoption grows
  • Yes, exactly. I think it's a big change for hypervisor detection methods.
  • @HyperDbgBot #11311 b o t 01:36 PM, 20 Mar 2026
    [discord] <zer0condition> for the malware stuff, its the same scenario i suppose? they need sandbox-specific artifacts instead
  • @HyperDbgBot #11312 b o t 01:38 PM, 20 Mar 2026
    [discord] <zer0condition> but yeah there are alot of pay-2-cheats or projects that are already hooking the microsoft hypervisor before the windows even boots using a bootkit
  • 👍
  • @HyperDbgBot #11314 b o t 01:38 PM, 20 Mar 2026
    [discord] <zer0condition> they have alot of stuff to detect anyone abusing the mshv for cheat purposes too
  • @hshwiksjzb #11315 01:39 PM, 20 Mar 2026
    Joined.
  • Which
  • @HyperDbgBot #11317 b o t 01:57 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: some old acquiantances of mine have made a really comprehensive write-up on deobfuscating a very popular provider recently which uses exactly that, here is the link to it if you'd like to readup: https://x.com/BackEngineerLab/status/2020030645616201731
    Back Engineering Labs (@BackEngineerLab) on X

    We’re releasing our analysis of https://t.co/y7UypbGS8Z, a major game cheat targeted by multiple studios in recent legal actions. We partially deobfuscated several Themida-protected components and document how it hijacks Hyper-V to inject and manipulate game code.

  • @staarblitz #11318 01:58 PM, 20 Mar 2026
    Does Themida finally support kernel drivers?
  • @staarblitz #11319 02:00 PM, 20 Mar 2026
    Can't enter to link
  • @staarblitz #11320 02:00 PM, 20 Mar 2026
    Mostly Valorant cheats I assume
  • @HyperDbgBot #11321 b o t 02:01 PM, 20 Mar 2026
    [discord] <zer0condition> https://back.engineering/blog/04/02/2026/
    Deobfuscation and Analysis of Ring-1.io

    As part of this research, we partially deobfuscated multiple Themida-protected binaries used by ring-1.io, including its UEFI bootloader implant. Several critical functions were recovered to enable static analysis of the implant’s behavior. This work provides visibility into mechanisms that are intentionally designed to resist inspection, including virtualization-assisted hooks, execution redirection, and kernel manipulation techniques.

  • @HyperDbgBot #11322 b o t 02:01 PM, 20 Mar 2026
    GitHub - backengineering/ring-1.io: Deobfuscation and Analysis of Ring-1.io

    Deobfuscation and Analysis of Ring-1.io. Contribute to backengineering/ring-1.io development by creating an account on GitHub.

  • @staarblitz #11323 02:02 PM, 20 Mar 2026
    Ohh
  • @HyperDbgBot #11324 b o t 02:02 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: the main binary is a UEFI bootkit, and yes you can make it work with even UEFI modules, same with VMProtect, just a matter of switching the subsystem type and doing Virtualization + Mutation only
  • Vmprotect supports drivers but afaik themida didnt
  • @staarblitz #11326 02:02 PM, 20 Mar 2026
    They said codevirtualizer supports it
  • @HyperDbgBot #11327 b o t 02:03 PM, 20 Mar 2026
    [discord] <zer0condition> i did not bother reading properly through it regarding this, you may, there are alot of things that are being done wrongly though.
  • There are bin2bin obfuscators also
  • Everyone is making hypervisors nowadays
  • @staarblitz #11330 02:04 PM, 20 Mar 2026
    If this goes on piracy and cheating scene will turn into a big mess like Android rooting scene is
  • @HyperDbgBot #11331 b o t 02:05 PM, 20 Mar 2026
    [discord] <zer0condition> hypervisors have always been in the cheating scene, just not too common, they are way ahead of warez and malware scene, most competent people i know of, have been reversing anti-cheats and deploying them for stealthy internals, since way before 2021.
  • @staarblitz #11332 02:06 PM, 20 Mar 2026
    It's way more common today
  • @HyperDbgBot #11333 b o t 02:07 PM, 20 Mar 2026
    [discord] <zer0condition> yeah but your point? doesnt really help the fact that most of them don't do things properly and are caught before they can get it to run
  • I think it's because of the Denuvo news
  • Sure. Most of them are poorly written
  • Yeah. Cs.rin.ru is literally standardizing hypervisors as we speak
  • @HyperDbgBot #11337 b o t 02:09 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: not really, that is a joke of a "crack", they are just adding more overhead for things that can be done without going to that extend, its overkill, ive reversed some binaries of it and saw nothing impressive except CPUID and KUSER_SHARED_DATA related spoofing, its just a overhyped hardware spoofer.
  • I've entered on this site, there are some news about CSGO
  • @staarblitz #11339 02:09 PM, 20 Mar 2026
    It's a steam underground forum
  • Lmao
  • @rev1sor1337 #11341 02:09 PM, 20 Mar 2026
    Why is it on Russian
  • @staarblitz #11342 02:10 PM, 20 Mar 2026
    Forum is Russia based
  • @HyperDbgBot #11343 b o t 02:10 PM, 20 Mar 2026
    [discord] <zer0condition> even CPUID spoofing could have been done without an HV, if they actually reversed the binaries and found a way to locate the callsites
  • I know Russian, but can't understand where the main threads are
  • @staarblitz #11345 02:10 PM, 20 Mar 2026
    Click to forum in main page
  • @HyperDbgBot #11346 b o t 02:10 PM, 20 Mar 2026
    [discord] <zer0condition> but then again, the warez scene has not been very impressive lately
  • I see now, the menu isn't working on the mobile version of the site
  • @HyperDbgBot #11348 b o t 02:12 PM, 20 Mar 2026
    Denuvo 分析 - Sunset 的重构博客

    来源,CC BY-SA 4.0 协议,gemini-3-pro-preview翻译。\n前言 本文仅供教育目的。Denuvo 可以说是这世上最成功的数字版权管理(DRM)解决方案,因此许多人都对它感兴趣。这篇博客包含了我大量的个人笔记以及与其他逆向工程师(见 致谢)的通信内容,其中包含了关于 Denuvo 近期迭代的信息,很多内容我此前未见公开分享过。\n

  • I think that the main difficulty is shit like vmprotect etc
  • @HyperDbgBot #11350 b o t 02:12 PM, 20 Mar 2026
    [discord] <zer0condition> here is the origin where this "crack" came to be
  • @HyperDbgBot #11351 b o t 02:13 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: VMP is not the most impressive, neither is Themida, if we are comparing it to other commercial protectors in this current day context, the back.engineering people have an idea on good stuff and also anti-cheats like EAC. Riot Vanguard and Faceit use something very similar, you could say the same
  • @HyperDbgBot #11352 b o t 02:14 PM, 20 Mar 2026
    RE//verse 2026: Deobfuscation of a Real World Binary Obfuscator by James McGowan and Bas Zweers

    From RE//verse 2026, watch James McGowan and Bas Zweers' talk: Deobfuscation of a Real World Binary Obfuscator Talk Slides: https://github.com/AnalogCyberNuke/RE-Verse-2026-Slides/blob/main/Reverse26.pdf We analyze and deobfuscate a real-world commercial binary obfuscator used to protect several pieces of important software including Windows KernelMode game anti-cheat systems. We explain our analysis and deobfuscation processes, including the custom tooling we built along the way which can be generalized to work on other obfuscators. Finally, we present a complete taxonomy of its structure, some deobfuscated binaries, and a sneak peek behind the scenes of some clever anti-cheat systems. For more RE//verse updates, subscribe to our newsletter: https://mailchi.mp/re-verse/reverse-mailing-list-signup

  • If vmp is well configured, it's not easy to analyze executable for me
  • @HyperDbgBot #11354 b o t 02:14 PM, 20 Mar 2026
    [discord] <zer0condition> this is a really nice talk addressing it by the back.engineering people
  • Anti debug is the main issue for me
  • most people have proper tooling for lifting, deobfuscating, rebuilding blah blah, it’s not hard for people who know how advanced obfuscation works
  • I tried to use Titan in my research, but the result is shit
  • EAC has put out a new obfuscation, similar to the “hungarian tech” by vgk and faceit, have you checked it?
  • look into remill and llvm stuff
  • @HyperDbgBot #11360 b o t 02:18 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: not personally yet, been busy with school, but have heard its similar to it yeah but better
  • @hshwiksjzb #11361 02:19 PM, 20 Mar 2026
    gotcha, also please accept the friend request on discord
  • you can do
    rdtsc a
    rdtsc b
    cpuid
    rdtsc c
    rdtsc d
    and d-c should not be apparently larger than b-a, I think
  • reasonable xD
  • that's great
  • I always thought ACE had the most aggressive hypervisor detection. Surprised EAC is stricter
  • @HyperDbgBot #11366 b o t 03:22 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: nope sadly, their credibility falls alot because they copy-pasted a detection library straight from GitHub onto their code, https://github.com/jonomango/nohv
    GitHub - jonomango/nohv: Kernel driver for detecting Intel VT-x hypervisors.

    Kernel driver for detecting Intel VT-x hypervisors. - jonomango/nohv

  • @HyperDbgBot #11367 b o t 03:24 PM, 20 Mar 2026
    [discord] <zer0condition> more like, most of their detection mechanisms are straight from GitHub, it has been confirmed via many credible sources (reverse engineers) by comparing their exection sequence for such checks.
  • Why can't I catch all rdtsc?
  • did u not read
  • @hshwiksjzb #11370 03:25 PM, 20 Mar 2026
    he sent it up there long ago
  • ^^^^
  • haha jonomangoo
  • Why can't we reduce the cpu freq that the system sees?
  • really? didn't expected that😆I've never dived into ACE kernel as ACE-lite's kernel driver only added an ob callback to protect the process
  • @HyperDbgBot #11376 b o t 03:28 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: yeah, i havent taken a look too in a long time, their protection is also very VMP inspired i should say
  • .tvm0 lol, they also use it in its usermode code and many other tencent products
  • @HyperDbgBot #11378 b o t 03:30 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: (reply to rev1sor1337) TSC doesnt measure frequency, it counts cycles at a fixed rate (invariant TSC on modern CPUs), reducing what the system "sees" would mean applying a constant offset or scaling factor to every TSC read: but that breaks monotonicity guarantees the OS depends on. spinlocks, scheduler quantum, QueryPerformanceCounter all assume TSC moves forward consistently, mess with that and you get watchdog timeouts, TDR, or subtle timing corruption.
  • @HyperDbgBot #11379 b o t 03:30 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: I've already made detailed descriptions on it, please read the blog first.
  • @HyperDbgBot #11380 b o t 03:32 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: yep
  • @5192080494 #11381 03:32 PM, 20 Mar 2026
    I do see some hypervisor impls intercepts all rdtsc calls and reduce them based on the time vmexit uses
  • @5192080494 #11382 03:33 PM, 20 Mar 2026
    and it lags a lot
  • @HyperDbgBot #11383 b o t 03:34 PM, 20 Mar 2026
    [discord] <zer0condition> [reply]: yeah that approach exists too but it has alot of issues.
  • @HyperDbgBot #11384 b o t 03:35 PM, 20 Mar 2026
    [discord] <zer0condition> cummulative drift, monotonicity and also performance yes all applies
  • or to say most public hvs with bypass use such method
  • @HyperDbgBot #11386 b o t 03:36 PM, 20 Mar 2026
    [discord] <zer0condition> long sessions that hammer the TSC and you can imagine how the that turns out
  • @getting458 #11387 03:57 PM, 20 Mar 2026
    zer0condition
  • @getting458 #11388 03:57 PM, 20 Mar 2026
    I'm working on our project and also finished the EPT hook by the way
  • @HyperDbgBot #11389 b o t 03:58 PM, 20 Mar 2026
    [discord] <zer0condition> i am confused, who are you?
  • Reminder that DMAs bypass EPTs unless you do mmio virtualization
  • @staarblitz #11391 04:25 PM, 20 Mar 2026
    Vanguard uses intel's nic driver to perform DMAs
  • @ghvv188 ↶ Reply to #11293 #11392 07:51 PM, 20 Mar 2026
    Hi, no I’m running on a 12th Gen Intel Core i5-12600KF. The issue seems different I can’t fully disable it, and the error message doesn’t provide any useful information
  • 21 March 2026 (15 messages)
  • @staarblitz #11394 10:20 AM, 21 Mar 2026
    msinfo32. Verify that its disabled from there. If it isnt, open cmd as admin and type bcdedit /set hypervisorlaunchtype off then restart
  • I also did this, but it wasn't enough last time that checked it on a core ultra 2XX.
  • Could you check these registry items:
    https://woshub.com/disable-credential-guard-windows/
    How to Disable (Enable) Credential Guard in Windows 11 | Windows OS Hub

    The Credential Guard security feature in the latest versions of Windows protects accounts against theft and unauthorized use, including Pass-the-Hash and Pass-the-Ticket attacks. Credential Guard uses virtualization-based security (VBS) to…

  • Did you disable every device security option in windows security?
  • @staarblitz #11398 12:51 PM, 21 Mar 2026
    That's also required
  • After adding those registry entries it worked, but since I also disabled a lot of other things, I'm not sure if it was only because of those regsitry items.
  • I think so
  • @staarblitz #11401 12:52 PM, 21 Mar 2026
    It always worked for me so far
  • @staarblitz #11402 12:52 PM, 21 Mar 2026
    Disabling options in defender and bcdedit
  • In a new machine? Recently?
  • @staarblitz #11404 12:52 PM, 21 Mar 2026
    They are making it harder though as far as I heard
  • Yeah
  • @staarblitz #11406 12:52 PM, 21 Mar 2026
    25h2
  • @HughEverett #11407 12:53 PM, 21 Mar 2026
    👍
  • @HyperDbgBot #11409 b o t 07:34 PM, 21 Mar 2026
    [discord] <unrustled.jimmies> VBS can be uefi locked and stored as a secure boot efi var and this will force it on no matter the value of any other setting. You can use secconfig.efi, a special tool signed by microsoft to disable it without turning off secure boot or just disable secure boot. See https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/configure?tabs=intune#disable-credential-guard-with-uefi-lock

    > bcdedit /set hypervisorlaunchtype off

    iirc correctly, hyperdbg can work under hyperv, it just can't work under VBS.
    Configure Credential Guard

    Learn how to configure Credential Guard using MDM, Group Policy, or the registry.

  • 22 March 2026 (4 messages)
  • @ghvv188 ↶ Reply to #11396 #11410 12:39 AM, 22 Mar 2026
    Alr, thanks
  • Interesting. Thanks for sharing.
  • @areyou_ok_a #11412 09:15 AM, 22 Mar 2026
    Joined.
  • @asiker123 #11414 07:19 PM, 22 Mar 2026
    Joined.
  • 23 March 2026 (2 messages)
  • @HyperDbgBot #11415 b o t 09:34 AM, 23 Mar 2026
    [discord] <fexsped> Is this project intel only? What happened to reddbg?
  • HyperDbg is Intel only for now. RedDbg is archived, not in a working state.
  • 24 March 2026 (10 messages)
  • @getting458 #11417 12:36 PM, 24 Mar 2026
    How does AMD solve the EPT hook issue if it's called frequently
  • @5731277710 #11418 01:56 PM, 24 Mar 2026
    Joined.
  • AMD processors have their own implantation of SLAT, it's called NPT.
  • @HughEverett #11420 02:01 PM, 24 Mar 2026
    I think you could check SimpleSVM project for implemtation of EPT (NPT) hooks there.
  • @ghvv188 take a look at this one too:
    https://www.elevenforum.com/t/enable-or-disable-system-guard-secure-launch-for-firmware-protection-in-windows-11.29233/
    Enable or Disable System Guard Secure Launch for Firmware...

    This tutorial will show you how to enable or disable Microsoft Defender System Guard Secure Launch for firmware protection in Windows 10 and Windows 11 Secured-core PCs. Microsoft has worked with...

  • @HughEverett #11422 02:54 PM, 24 Mar 2026
    There are two registry files here that I think last time that we tried to run HyperDbg, running these reg files helped us disabling VBS (Hyper-V).
  • @asiker123 #11424 03:13 PM, 24 Mar 2026
    Try turning off VBS using the method in that link. There's a tool called Toe.bat, and another one for disabling the virtual machine.
  • @asiker123 #11425 03:13 PM, 24 Mar 2026
    There was also a script provided by Microsoft that can disable VBS. But every time I restart my computer the first time, it turns off successfully. When I restart again, VBS turns back on automatically. So there might be something wrong with Microsoft's script.
  • @ghvv188 ↶ Reply to #11421 #11426 06:46 PM, 24 Mar 2026
    Thank you
  • 26 March 2026 (6 messages)
  • @HyperDbgBot #11427 b o t 03:59 AM, 26 Mar 2026
    [discord] <livanec_smaslem> Can I ask why do we allocate 3* 4096 of memory ? 3 times more than the maximum size of VMXON region ? I get that allocating 2* would guarantee we can manually align it, but whats the 3* for ?
    https://cdn.discordapp.com/attachments/962350355839066130/1486575252850086049/image.png?ex=69c60097&is=69c4af17&hm=1f296c83c79b928522e06e6761b334c27981c769ebb80b9c1d46ab03d42237f7&
  • @staarblitz #11428 04:23 AM, 26 Mar 2026
    I guess its "just in case", but ExAllocatePool2 already guarantees page-aligned allocations on page-aligned size requests
  • @HyperDbgBot #11429 b o t 04:30 AM, 26 Mar 2026
    [discord] <livanec_smaslem> oh yeah you're right.. so this would just be enough ? and hyperdbg is allocating just because
    ExAllocatePool2(POOL_FLAG_NON_PAGED, 4096, 'vmxo');
  • @staarblitz #11430 04:41 AM, 26 Mar 2026
    It's allocating to make sure it doesnt overwrite pages before and after it when it aligns the allocation afaik
  • @staarblitz #11431 04:41 AM, 26 Mar 2026
    That was how its in hypervisor from scratch tutorials
  • But yeah. This is a fact
  • 27 March 2026 (52 messages)
  • @CheapNow ↶ Reply to #11432 #11433 03:49 AM, 27 Mar 2026
    3 pages to align a page from an allocator that already returns page aligned memory.. whoever the fuck taught you this is brain damaged and needs to be retroactively aborted
  • Then what it is for
  • @staarblitz #11435 04:00 AM, 27 Mar 2026
    #define ALIGNMENT_PAGE_SIZE 4096

    Yeah. There was no such allocation
  • @staarblitz #11436 04:03 AM, 27 Mar 2026
    No we do in part 3's source. It wasn't 3 though.
    int VMXONSize = 2 * VMXON_SIZE;
  • @HyperDbgBot #11437 b o t 06:31 AM, 27 Mar 2026
    [discord] <livanec_smaslem> [reply]: in hyperdbg source it is 3. they also add ALIGNMENT_PAGE_SIZE which is another 4096. i dont understand the reasoning
    https://cdn.discordapp.com/attachments/962350355839066130/1486976028139192431/image.png?ex=69c775d7&is=69c62457&hm=7ab6484185598200a6d4c252193726dc3be56ceca49a17b30f388cccfe690a2b&
  • @asiker123 #11439 10:35 AM, 27 Mar 2026
    I’ve already installed the HyperDbg VMM driver on my physical machine. Do I still need to install the VMM driver on the Windows 10 virtual machine in VMware?
  • If you are using HyperDbg in the debugger mode, you don't need to install the driver or anything on your physical machine. You just need to install drivers in the guest while HyperDbg on the side of the host acts as a (user-mode) serial communication app.
  • @asiker123 #11441 10:40 AM, 27 Mar 2026
    thankyou
  • @CheapNow ↶ Reply to #11434 #11442 11:09 AM, 27 Mar 2026
    I was waiting for your justification
  • @CheapNow #11443 11:09 AM, 27 Mar 2026
    2* PAGE_SIZE when ExAllocatePool2 already hands back an aligned address is retarded
  • Ask the author of code (Sina I guess), my guess is that he didn't know it returned a page aligned address
  • I think that, by default, if we allocate 4096 bytes, Windows gives us an aligned memory address (at least from what I vaguely remember).
  • @staarblitz #11446 11:56 AM, 27 Mar 2026
    Yep it does
  • @HyperDbgBot #11447 b o t 05:29 PM, 27 Mar 2026
    [discord] <fexsped> I was reading [here](https://rayanfam.com/topics/hypervisor-from-scratch-part-2/) about how VMX needs to be enabled through cr4 and then having to switch to vmx operating mode using VMXON. Does this VMXON take effect only on the current core? how do type2 hypervisors work while also allowing the underlying system to function without beint in VMX operating mode?
    Hypervisor From Scratch – Part 2: Entering VMX Operation

    We write about Windows Internals, Hypervisors, Linux, and Networks.

  • @honorary_bot #11448 05:32 PM, 27 Mar 2026
    Yes, vmxon affects only the current CPU thread. It's totally possible to enable VMX only for a subset of the cores. What problems do you see in that scenario?
  • Vmx mode has to be enabled for any vt-x instruction to be recognized
  • @staarblitz #11450 05:56 PM, 27 Mar 2026
    So if a core is hypervised, the vmx mode must be on. You might be confusing vmx root and non root operating modes
  • @HyperDbgBot #11451 b o t 06:31 PM, 27 Mar 2026
    [discord] <fexsped> so in a type2 hypervisor a certain number of cores are in VMXON mode at any given time and the others are reserved for the OS? is that what giving a VM a certain number of cores do?
  • @honorary_bot #11452 06:33 PM, 27 Mar 2026
    All of the cores are usually "vmxon"-ed via IPI
  • @HyperDbgBot #11453 b o t 07:06 PM, 27 Mar 2026
    [discord] <fexsped> if all cores are in vmx mode doesnt that mean they should be running a vmm and not an os?
  • @honorary_bot #11454 07:10 PM, 27 Mar 2026
    It only means that it may use vmx instructions.
  • Vmx mode means cpu is capable of vt-x
  • @staarblitz #11456 07:31 PM, 27 Mar 2026
    Vmx root mode is hypervisor
  • @staarblitz #11457 07:31 PM, 27 Mar 2026
    Vmx non root mode is the guest
  • @HyperDbgBot #11458 b o t 07:31 PM, 27 Mar 2026
    [discord] <fexsped> so thats all vmxon does?
  • @staarblitz #11459 07:32 PM, 27 Mar 2026
    Yup
  • @HyperDbgBot #11460 b o t 07:32 PM, 27 Mar 2026
    [discord] <fexsped> whats up with that cr4 bit you have to set?
  • @staarblitz #11461 07:32 PM, 27 Mar 2026
    It's to enable vt-x for the cpu
  • @HyperDbgBot #11462 b o t 07:32 PM, 27 Mar 2026
    [discord] <fexsped> so you need to enable vt-x twice
  • @staarblitz #11463 07:32 PM, 27 Mar 2026
    It doesn't have to do anything with guest/host separation
  • No. Only one time
  • @honorary_bot #11465 07:33 PM, 27 Mar 2026
    CR4 is usually set up by the bios and locked, so you can't modify it in runtime
  • @staarblitz #11466 07:33 PM, 27 Mar 2026
    VMX bit enables vt-x extension. Vmxon loads the vmxon region required by each logical core
  • @HyperDbgBot #11467 b o t 07:33 PM, 27 Mar 2026
    [discord] <fexsped> oh that makes sense with the BIOS setting to enable virtualization
  • @staarblitz #11468 07:33 PM, 27 Mar 2026
    Vmxon is required for other instructions like vmresume, vmlaunch
  • Yes, thats what it does
  • @HyperDbgBot #11470 b o t 07:34 PM, 27 Mar 2026
    [discord] <fexsped> [reply]: the vmcs?
  • @staarblitz #11471 07:34 PM, 27 Mar 2026
    Vmcs and vmxon region are different
  • @HyperDbgBot #11472 b o t 07:41 PM, 27 Mar 2026
    [discord] <fexsped> what does this vmxon region contain? All I find is this in the intel manual:
    > Before executing VMXON, software should write the VMCS revision identifier (see Section 26.2) to the VMXON
    > region. (Specifically, it should write the 31-bit VMCS revision identifier to bits 30:0 of the first 4 bytes of the
    > VMXON region; bit 31 should be cleared to 0.)
  • @honorary_bot #11473 07:42 PM, 27 Mar 2026
    Treat that region as opaque
  • @HyperDbgBot #11474 b o t 07:43 PM, 27 Mar 2026
    [discord] <fexsped> so just give a page to vmxon and its gods plan?
  • @honorary_bot #11475 07:43 PM, 27 Mar 2026
    Yes, exactly
  • @HyperDbgBot #11476 b o t 07:43 PM, 27 Mar 2026
    [discord] <fexsped> alr lol
  • Implementation specific
  • @staarblitz #11478 07:43 PM, 27 Mar 2026
    Except the revision identifier
  • @HyperDbgBot #11479 b o t 07:44 PM, 27 Mar 2026
    [discord] <fexsped> also I was wondering why this guide is on windows
  • @HyperDbgBot #11480 b o t 07:44 PM, 27 Mar 2026
    [discord] <fexsped> wouldnt it be easier on linux?
  • @staarblitz #11481 07:45 PM, 27 Mar 2026
    It's same for everything
  • @staarblitz #11482 07:45 PM, 27 Mar 2026
    We hyperjack Windows so we need Windows specific apis to allocate memory and run on all other cores
  • @staarblitz #11483 07:45 PM, 27 Mar 2026
    Otherwise, the process is same for say, hyperjacking linux. Or writing a separation kernel
  • @HyperDbgBot #11484 b o t 07:47 PM, 27 Mar 2026
    [discord] <fexsped> how far along is porting hyperdbg to linux?
  • @HyperDbgBot #11485 b o t 07:49 PM, 27 Mar 2026
    [discord] <fexsped> I see why this was done for windows first as there is a lot more reversing potential to gain out of it
  • 30 March 2026 (1 messages)
  • @NetSurfer7 #11491 09:28 PM, 30 Mar 2026
    Joined.
  • 31 March 2026 (3 messages)
  • /report
  • @MissRose_bot ↶ Reply to #11492 #11494 b o t 01:41 AM, 31 Mar 2026
    Reported ⚜️LEBAP⚜️ [7001057901] to admins.​​​​​​​​​​
  • @Fer3onv #11495 04:43 AM, 31 Mar 2026
    Joined.