AleksaMCode / AMx64Links
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆22Updated last year
Alternatives and similar repositories for AMx64
Users that are interested in AMx64 are comparing it to the libraries listed below
Sorting:
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆40Updated 2 years ago
- EDR PoC WIP LLC☆11Updated last year
- Me fockin' pe protector☆45Updated 3 years ago
- devirtualization vmprotect☆63Updated 2 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- Binary DisASseMbler☆24Updated 3 years ago
- Debug Print viewer (user and kernel)☆69Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆34Updated last year
- ☆59Updated 3 years ago
- Port of zentool to Windows☆26Updated 8 months ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- Not mine, just saved☆12Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated 2 years ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- A demonstration of hooking into the VMProtect-2 virtual machine☆22Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Updated 3 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- Small project to generate fake DLLs based on an executable's import table☆24Updated 5 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- This is just a x64dbg script system support.☆48Updated 3 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆18Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 5 years ago
- ☆37Updated 2 years ago
- The program is intended for a dynamic unpacking of binders, crypters, packers and protectors☆10Updated 5 years ago