0ffffffffh / yummyPasteLinks
paste string formatted byte data block into x64dbg easy.
☆41Updated 4 years ago
Alternatives and similar repositories for yummyPaste
Users that are interested in yummyPaste are comparing it to the libraries listed below
Sorting:
- This is just a x64dbg script system support.☆48Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆97Updated 2 years ago
- ☆46Updated 4 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆69Updated 3 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- APISearch Plugin (x64) - A Plugin For x64dbg☆42Updated 7 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆30Updated 5 years ago
- Debug Print viewer (user and kernel)☆69Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Automatic updater plugin for x64dbg☆22Updated 4 months ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆96Updated 2 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆35Updated last year
- Collaboration platform for reverse engineering tools.☆44Updated 11 months ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆39Updated 3 years ago
- ☆30Updated 3 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Updated 3 years ago
- Fork of Scylla with additional fixes and Python bindings.☆52Updated last year
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63Updated 8 years ago
- An automatic tool for fixing dumped PE files☆42Updated 5 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Binary Ninja plugin for automating VMProtect analysis☆63Updated 2 years ago
- vmp2.x devirtualization☆84Updated last year