0ffffffffh / yummyPaste
paste string formatted byte data block into x64dbg easy.
☆39Updated 4 years ago
Alternatives and similar repositories for yummyPaste
Users that are interested in yummyPaste are comparing it to the libraries listed below
Sorting:
- This is just a x64dbg script system support.☆46Updated 2 years ago
- x64dbg plugin - AttachHelper☆21Updated 8 years ago
- Automatic updater plugin for x64dbg☆21Updated 4 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆64Updated last year
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆16Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆92Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- ☆48Updated 6 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- Windows Console Monitor☆34Updated 5 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 10 months ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆51Updated 5 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- Global DLL injector☆67Updated 4 years ago
- idenLib (Library Function Identification) plugin for x32dbg☆41Updated 6 years ago
- ☆34Updated 4 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Plugin to label PEB addresses.☆29Updated 8 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Code virtualizer☆23Updated 9 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆77Updated 14 years ago
- Injector with kernel power☆16Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- x64dbg python3 plugin☆23Updated 3 weeks ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago