AleksaMCode / AMx64Links
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆22Updated last year
Alternatives and similar repositories for AMx64
Users that are interested in AMx64 are comparing it to the libraries listed below
Sorting:
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆41Updated 2 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆34Updated last year
- An example code of CiGetCertPublisherName☆17Updated 3 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Updated 3 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated 2 years ago
- Binary DisASseMbler☆24Updated 3 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- EDR PoC WIP LLC☆10Updated last year
- Port of zentool to Windows☆26Updated 9 months ago
- devirtualization vmprotect☆64Updated 2 years ago
- Test data for x86 instructions☆13Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆23Updated 2 years ago
- ☆26Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 5 years ago
- Debug Print viewer (user and kernel)☆69Updated last year
- ☆31Updated 3 years ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 4 months ago
- A Windows API hooking library !☆31Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆42Updated 2 years ago
- .lib file for linking against the NT CRT☆18Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- Symbolic Execution based on lifting amd64 to z3☆29Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆57Updated 2 years ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- Collaboration platform for reverse engineering tools.☆44Updated 11 months ago
- Small project to generate fake DLLs based on an executable's import table☆24Updated 5 years ago