0dayatday0 / BattleFN-cheat-analysisLinks
☆47Updated 3 years ago
Alternatives and similar repositories for BattleFN-cheat-analysis
Users that are interested in BattleFN-cheat-analysis are comparing it to the libraries listed below
Sorting:
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆60Updated last year
- Lifting from native architecture to VTIL. (WIP)☆75Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Binary Ninja plugin for automating VMProtect analysis☆61Updated 2 years ago
- ☆30Updated 3 years ago
- VM devirtualization PoC based on AsmJit and llvm☆114Updated 3 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆60Updated 11 months ago
- Kernel ReClassEx☆62Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- fix vmprotect import function used unicorn-engine.☆93Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆72Updated 5 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆98Updated 4 years ago
- Code virtualizer☆24Updated 9 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆69Updated 5 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆32Updated 4 years ago
- ☆92Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆50Updated 4 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆40Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆35Updated 4 years ago
- ☆32Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- VMP Mutation API Fix☆41Updated 3 years ago
- ☆36Updated 3 years ago
- Lightweight PDB symbol parser and resolver☆26Updated 8 months ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated 11 months ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated last year
- x86-64 user mode emulation using Zydis☆47Updated 5 months ago