AleksaMCode / AMx64
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆23Updated last year
Alternatives and similar repositories for AMx64:
Users that are interested in AMx64 are comparing it to the libraries listed below
- Devirtualizer for VirtualGuard Protector using AsmResolver☆39Updated last year
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 2 years ago
- EDR PoC WIP LLC☆11Updated last year
- ☆27Updated last year
- Bypassing kernel patch protection runtime☆19Updated 2 years ago
- ☆30Updated 3 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 6 months ago
- Elevate arbitrary MSR writes to kernel execution.☆32Updated last year
- Native API header files for the Process Hacker project (nightly).☆25Updated this week
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆26Updated 7 months ago
- .lib file for linking against the NT CRT☆18Updated 3 years ago
- Deobfuscator for remove proxy calls methods☆24Updated 2 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 3 years ago
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- x64dbg python3 plugin☆21Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆36Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 8 months ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆18Updated last year
- C++ Program used to dump Themida and VMProtect.☆23Updated last year
- Small project to generate fake DLLs based on an executable's import table☆23Updated 4 years ago
- Basic Deobfuscator for SaintFuscator, Using CCFlow with this tool is recommended☆16Updated 3 years ago
- Input-output driver☆24Updated this week
- Black Signature Driver☆22Updated last year
- Small memory leak PoC that is happening in IopGetDeviceInterfaces☆25Updated 4 years ago
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 5 years ago