Alex3434 / Binja-SigMaker
SigMaker plugin for Binary Ninja
☆9Updated 4 years ago
Alternatives and similar repositories for Binja-SigMaker:
Users that are interested in Binja-SigMaker are comparing it to the libraries listed below
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 7 months ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆40Updated 6 years ago
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- unicorn emulator for x64dbg☆31Updated 7 years ago
- ASUSTeK AsIO3 I/O driver unlock☆20Updated 3 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- VTIL command line utility☆27Updated 3 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆71Updated 5 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated 3 years ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- clone of armadillo patched for windows☆46Updated 3 months ago
- ☆45Updated 4 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆50Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Updated 4 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆48Updated 4 years ago
- Lifting from native architecture to VTIL. (WIP)☆74Updated 3 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- ☆37Updated last year
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆58Updated 7 months ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- LLVM based devirtualization PoC’s.☆20Updated 3 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆58Updated 6 months ago
- ☆27Updated 6 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- A simple command line utility to quickly load and unload Windows drivers☆17Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago