BradDorney / PatcherLinks
Lightweight C++11 library with a tidy API, built using Capstone, to facilitate creating and tracking function-level and instruction-level hooks, or other arbitrary memory patches.
☆40Updated 2 months ago
Alternatives and similar repositories for Patcher
Users that are interested in Patcher are comparing it to the libraries listed below
Sorting:
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Updated 6 years ago
- XDV is disassembler or debugger that works based on the extension plugin.☆55Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆40Updated 7 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆33Updated 5 years ago
- Personal curation of Clang/LLVM patches.☆12Updated 4 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- UNIPE - A small framwork to execute PE files with UniCorn☆47Updated 7 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- Library for using direct system calls☆36Updated 8 months ago
- ☆12Updated 8 years ago
- ☆14Updated 4 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆36Updated last year
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Updated 9 years ago
- ☆19Updated 6 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆23Updated 8 months ago
- A dark x64dbg color theme based on IDA Consonance☆19Updated 7 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- init☆14Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆78Updated 6 years ago
- A common set of helpers used across VTIL toolchain. Moved into -->☆20Updated 5 years ago
- You don't need install any wdk for development kernel driver☆24Updated 7 years ago
- HAXM hypervisor client☆17Updated 6 years ago
- enable libemu run pe file and add some good modify☆14Updated 6 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆53Updated last year