86hh / jasmLinks
executing JS from x86 code
☆27Updated 6 years ago
Alternatives and similar repositories for jasm
Users that are interested in jasm are comparing it to the libraries listed below
Sorting:
- ☆34Updated 7 years ago
- ☆45Updated 7 years ago
- Windows x64 Process Scanner to detect application compatability shims☆37Updated 6 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year
- An Integrity-Check Monitoring Pintool☆58Updated 4 years ago
- ☆21Updated 6 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆25Updated last year
- ReactOS x86-32 syscall fuzzer☆56Updated last month
- Windows API listing in JSON format - generated from SDK headers + SDK API documentation☆66Updated 5 years ago
- A repository with simple projects created for testing/learning purpose☆46Updated 3 years ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- A DLL that performs IAT hooking☆27Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- Bootkits Revisited☆40Updated 11 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- A wrapper for capstone for bearparser☆14Updated 2 years ago
- penter hook example and driver time recorder☆31Updated 7 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆26Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Updated 9 years ago
- Static analysis tools for x86 assembly☆13Updated 8 years ago
- ☆16Updated 5 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Simple x64dbg plugin to show registers on every step.☆16Updated 6 years ago
- ☆14Updated 4 years ago
- User-mode part of Zerokit platform☆22Updated 6 years ago
- Virtualization detection through speculative execution PoCs and papers☆70Updated 7 years ago