AzzOnFire / yarkaLinks
IDA plugin for YARA signature creation
☆18Updated 2 months ago
Alternatives and similar repositories for yarka
Users that are interested in yarka are comparing it to the libraries listed below
Sorting:
- ☆31Updated 3 weeks ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Updated 2 years ago
- devirtualization vmprotect☆65Updated 2 years ago
- ☆37Updated 2 years ago
- a IDA plugin helps you to manage your IDA Comments☆25Updated last year
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- ZMQ and Messagepack Powered Remote Automation Plugin for x64dbg☆58Updated 4 months ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 6 months ago
- IDA Type Info Libraries for RE☆32Updated last year
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆18Updated 4 years ago
- ☆22Updated 2 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 3 years ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆119Updated 2 weeks ago
- ☆29Updated last year
- x86-64 user mode emulation using Zydis☆72Updated 5 months ago
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆52Updated last month
- binary instrumentation, analysis, and patching framework☆100Updated last week
- Emulate Drivers in RING3 with self context mapping or unicorn☆21Updated last year
- VMProtect2 Deobfuscation Tooling☆84Updated 3 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆94Updated 3 months ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆46Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆24Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆44Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆27Updated 2 years ago
- A collection of LLVM passes for obfuscating☆42Updated 2 years ago
- VMProtectTest☆40Updated 2 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year