0xbadc0de1 / VmP_DBGLinks
This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the vmp bytecode level. It was made using TitanEngine for the debug engine and Qt for the gui. Do not expect much of it and feel free to report any bugs.
☆46Updated 8 years ago
Alternatives and similar repositories for VmP_DBG
Users that are interested in VmP_DBG are comparing it to the libraries listed below
Sorting:
- ☆40Updated 5 years ago
- ☆35Updated 9 years ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- createfile☆48Updated 9 years ago
- Windows anti-rootkit library☆39Updated 10 years ago
- map driver to memory☆25Updated 6 years ago
- ☆27Updated 6 years ago
- by others☆38Updated 7 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- An ark tool's driver☆40Updated 8 years ago
- LookDrvCode☆30Updated 10 years ago
- Publish☆53Updated 4 years ago
- ☆23Updated 7 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆43Updated 11 years ago
- 内核级ARK工具。☆59Updated 8 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- A simple x86 (32 bit) disassembler☆7Updated 6 years ago
- You don't need install any wdk for development kernel driver☆24Updated 6 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- ☆32Updated 6 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- For Example. See Miro's Blog☆30Updated 2 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- 锁主页驱动☆37Updated 6 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆77Updated 14 years ago
- Intel Virtualization Technology demo☆66Updated 8 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Updated 6 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆75Updated 3 years ago
- ☆35Updated 4 years ago