AleksaMCode / AMx64
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆23Updated last year
Alternatives and similar repositories for AMx64:
Users that are interested in AMx64 are comparing it to the libraries listed below
- Devirtualizer for VirtualGuard Protector using AsmResolver☆39Updated last year
- Input-output driver☆24Updated last year
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 2 years ago
- EDR PoC WIP LLC☆10Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 5 months ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- .lib file for linking against the NT CRT☆18Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Bypassing kernel patch protection runtime☆19Updated last year
- x64dbg python3 plugin☆21Updated last year
- Symbolic Execution based on lifting amd64 to z3☆21Updated 7 months ago
- ☆30Updated 3 years ago
- Small project to generate fake DLLs based on an executable's import table☆23Updated 4 years ago
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆18Updated 4 months ago
- Signature scanner and API hooks to detect malicious process injection☆24Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆26Updated last year
- ☆26Updated last year
- Test data for x86 instructions☆13Updated 3 years ago
- Example of making debugger using Hardware Breakpoint + VEH☆18Updated 3 years ago
- A driver to implement IOCTL hooking☆24Updated 2 years ago
- Debug Print viewer (user and kernel)☆65Updated last year
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 5 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆9Updated 2 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆26Updated 6 months ago
- Windows Minidump loader for Ghidra☆18Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- A lightweight x86/x64 VM☆18Updated 4 years ago
- This is a POC Test project for INTEL CPUs on blocking NMI Entries through the IDT Handler.☆33Updated 3 months ago
- Personal curation of Clang/LLVM patches.☆13Updated 3 years ago