67-6f-64 / AntiOreans-CodeDevirtualizer
☆27Updated last year
Alternatives and similar repositories for AntiOreans-CodeDevirtualizer:
Users that are interested in AntiOreans-CodeDevirtualizer are comparing it to the libraries listed below
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆41Updated last year
- x86-64 user mode emulation using Zydis☆44Updated 2 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆57Updated last year
- Cross-Platform Framework for High-Speed Memory Pattern Scanning with Multithreading, SIMD Support, and Alternative STL ETL Integration☆37Updated 2 months ago
- Me fockin' pe protector☆45Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 6 months ago
- A portable header only library extending the C++20 STL.☆73Updated 11 months ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆39Updated 5 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆98Updated 11 months ago
- C/C++ antidebugging library for Windows☆17Updated 2 months ago
- A devirtualization engine for Themida.☆97Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 8 months ago
- Kernel ReClassEx☆65Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- Code virtualizer☆23Updated 8 years ago
- just proof of concept. hooking MmCopyMemory PG safe.☆67Updated last year
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Simple and lightweight hypervisor for AMD processors☆27Updated 3 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆76Updated 7 months ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆51Updated last year
- Lightweight PDB symbol parser and resolver☆24Updated 4 months ago
- Windows driver mapper via the UEFI☆45Updated 3 months ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆38Updated 3 months ago
- This tool Decrypt and Extract the files from the EAC☆63Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆132Updated 5 months ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆76Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆44Updated 8 months ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆24Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆70Updated last year