AleksaMCode / AMx64Links
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆22Updated 2 years ago
Alternatives and similar repositories for AMx64
Users that are interested in AMx64 are comparing it to the libraries listed below
Sorting:
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- Test data for x86 instructions☆13Updated 4 years ago
- EDR PoC WIP LLC☆10Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago
- ☆25Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆27Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆29Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆42Updated 2 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆42Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 4 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- An example code of CiGetCertPublisherName☆17Updated 3 years ago
- ☆37Updated 2 years ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆31Updated 2 weeks ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- devirtualization vmprotect☆64Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- Binary DisASseMbler☆24Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆48Updated 2 weeks ago
- ☆29Updated last year
- Small driver that uses alternative syscalls feature (the project is still under development).☆18Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 4 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆24Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated 2 years ago