67-6f-64 / AntiOreans-CodeDevirtualizerLinks
☆63Updated 2 years ago
Alternatives and similar repositories for AntiOreans-CodeDevirtualizer
Users that are interested in AntiOreans-CodeDevirtualizer are comparing it to the libraries listed below
Sorting:
- A devirtualization engine for Themida.☆105Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆66Updated last year
- A x86_64 software emulator☆161Updated 4 months ago
- x86-64 user mode emulation using Zydis☆71Updated 4 months ago
- Ghetto user mode emulation of Windows kernel drivers.☆158Updated last year
- ☆91Updated 2 months ago
- Kernel ReClassEx☆66Updated 2 years ago
- A portable header only library extending the C++20 STL.☆94Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆115Updated last week
- Binary rewriter for 64-bit PE files.☆92Updated last year
- VM devirtualization PoC based on AsmJit and llvm☆122Updated 4 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆47Updated 2 years ago
- Cross-Platform Framework for High-Speed Memory Pattern Scanning with Multithreading, SIMD Support, and Alternative STL ETL Integration☆45Updated 2 months ago
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆89Updated 2 years ago
- Pure Go port of Hacker Disassembler Engine.☆25Updated 10 months ago
- Windows PDB parser for kernel-mode environment.☆103Updated 7 months ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆71Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆29Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆192Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Native opaque predicate cleaner plugin for Binary Ninja☆44Updated last week
- Themida 3.x research☆35Updated 10 months ago
- VMProtect2 Deobfuscation Tooling☆81Updated 2 months ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆80Updated 3 years ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆97Updated last year
- Hijacking Hyper-V at Runtime with DDMA☆74Updated 5 months ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆59Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year