86hh / jasmLinks
executing JS from x86 code
☆27Updated 6 years ago
Alternatives and similar repositories for jasm
Users that are interested in jasm are comparing it to the libraries listed below
Sorting:
- ☆34Updated 8 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 7 years ago
- ☆46Updated 7 years ago
- An Integrity-Check Monitoring Pintool☆58Updated 5 years ago
- ☆21Updated 6 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Bootkits Revisited☆40Updated 11 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- ☆16Updated 11 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated 3 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- A wrapper for capstone for bearparser☆16Updated 2 months ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- Kernel mode windows NT API logger☆22Updated 6 years ago
- Headers for linking your software with ntdll.dll☆15Updated 5 years ago
- ReactOS x86-32 syscall fuzzer☆58Updated 5 months ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Updated last year
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Updated 9 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- A DLL that performs IAT hooking☆27Updated 7 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago