AleksaMCode / AMx64Links
AMx64 is a simulated 64-bit environment that can interpret nasm-like asm code. It allows a usage of different 64-bit registers and 64-bit addressable memory. It also has a build-in debugger called amdb.
☆22Updated last year
Alternatives and similar repositories for AMx64
Users that are interested in AMx64 are comparing it to the libraries listed below
Sorting:
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- EDR PoC WIP LLC☆11Updated last year
- A Windows API hooking library !☆32Updated 3 years ago
- An example code of CiGetCertPublisherName☆16Updated 3 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆40Updated 2 years ago
- Debug Print viewer (user and kernel)☆68Updated last year
- Signature scanner and API hooks to detect malicious process injection☆27Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- ☆59Updated 3 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆35Updated last year
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- ☆26Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- Decoder for VMProtect hwids☆17Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆43Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆21Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- x64dbg python3 plugin☆27Updated last month
- This is just a x64dbg script system support.☆47Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆45Updated 2 years ago
- Sample for Creating a new kernel object type and supporting API☆26Updated last year
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- ☆31Updated 3 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- Binary DisASseMbler☆24Updated 2 years ago