0ffffffffh / yummyPasteLinks
paste string formatted byte data block into x64dbg easy.
☆42Updated 5 years ago
Alternatives and similar repositories for yummyPaste
Users that are interested in yummyPaste are comparing it to the libraries listed below
Sorting:
- This is just a x64dbg script system support.☆48Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆98Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- Debug Print viewer (user and kernel)☆70Updated last year
- Parser for Microsoft Program Database (PDB) files☆77Updated 5 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- ☆46Updated 4 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆47Updated 2 months ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆71Updated 3 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆80Updated 6 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 5 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Updated 3 years ago
- x64dbg python3 plugin☆30Updated 2 weeks ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Updated 5 years ago
- ☆30Updated 4 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Updated last year
- Collaboration platform for reverse engineering tools.☆46Updated last year
- Fork of Scylla with additional fixes and Python bindings.☆54Updated last year
- vmp2.x devirtualization☆90Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63Updated 8 years ago
- devirtualization vmprotect☆64Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Code virtualizer☆26Updated 9 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆100Updated 2 years ago
- Plugin to label PEB addresses.☆31Updated 8 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Updated 3 years ago