0x221E 9b250a6270 Refactor: ModRM Handler replaced with compile-time lookup table.
Started refactoring to a library-based model to easily integrate
comprehensive unit testing. Added CPU exception handling system for
the GUI. Non-critical exceptions (though critical to execution of
emulated application) will not shutdown the application in the future
releases. Refactored Userspace::Run() logic so that the GUI-controls
reflect emulator behavior.
2026-02-10 14:57:55 +01:00
2026-02-04 12:52:42 +01:00

CPU Security Emulator [x86]

This is mostly a learning project for me. I am learning about the internals of a CPU and how it encodes/decodes instructions to produce the intended results.

As of now, there are limitied features, and supported instructions are limited.

See; https://0xinfinity.dev/specs/emulator for an exhaustive list of supported instructions and specific opcodes.

Planned emulator features

  • SIB Byte Support for existing and future instructions.
  • Execution Lock and Permission system for RAM.
  • Branch Prediction and Speculative Execution //Long-term plan
  • SIMD flattening (optional) and AV redirection (optional).
  • Buffer overflow prediction, detection, and reporting.

Planned architectural features

  • Better logging system
  • Comprehensive unit tests for each instruction.

Planned instructions

TBD

Requirements

  • gcc Rest; TBD
Description
Under Development
Readme 263 KiB
Languages
C++ 95%
CMake 4.8%
C 0.2%