AmrThabet / x86EmulatorLinks
☆72Updated 12 years ago
Alternatives and similar repositories for x86Emulator
Users that are interested in x86Emulator are comparing it to the libraries listed below
Sorting:
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- ☆117Updated 13 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆73Updated 8 years ago
- reverse engineering extension plugin for windbg☆120Updated 6 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Updated 9 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆79Updated 13 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆60Updated 6 months ago
- A branch-monitor-based solution for process monitoring.☆137Updated 5 years ago
- Decompiler for Code Virtualizer 1.3.8 (Oreans)☆87Updated 13 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- IntelVT-X nice feature -> tool☆95Updated 11 years ago
- A C polymorphic and metamorphic engine☆73Updated 7 years ago
- IDA script for vmprotect Windows Api address decoder☆53Updated 4 years ago
- A simple API monitor for Windbg☆65Updated 8 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Updated 9 years ago
- Identifying Virtual Table Functions using VTBL IDA Pro Plugin + Deviare Hooking Engine☆98Updated 12 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 8 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆72Updated last year
- metamorphic engine in python☆34Updated 9 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆118Updated 2 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Elevation of privilege detector based on HyperPlatform☆123Updated 8 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Updated 3 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- modify binary Portable Executable to hook its export functions☆67Updated 7 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Updated 6 years ago