BradDorney / PatcherLinks
Lightweight C++11 library with a tidy API, built using Capstone, to facilitate creating and tracking function-level and instruction-level hooks, or other arbitrary memory patches.
โ38Updated last month
Alternatives and similar repositories for Patcher
Users that are interested in Patcher are comparing it to the libraries listed below
Sorting:
- ๐งถ The Win32 usermode threading library with UMS/fibers/threads supportโ32Updated 5 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)โ38Updated 6 years ago
- Fetch PDB symbols directly from Microsoft's symbol serversโ42Updated 3 years ago
- Personal curation of Clang/LLVM patches.โ13Updated 4 years ago
- A number of samples to get you started with VTILs API.โ38Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)โ15Updated last year
- Library for using direct system callsโ35Updated 4 months ago
- A common set of helpers used across VTIL toolchain. Moved into -->โ20Updated 5 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structureโ35Updated 11 months ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.โ32Updated 5 years ago
- An API Monitor based on Instrumentationโ43Updated 7 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.โ53Updated 8 years ago
- Analysing and defeating PatchGuard universallyโ35Updated 4 years ago
- Figuring out the cause of a handle downgradeโ24Updated 2 years ago
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a fileโ40Updated 7 years ago
- UNIPE - A small framwork to execute PE files with UniCornโ46Updated 7 years ago
- Static library and headers for linking your software with ntdll.dllโ32Updated 5 years ago
- a method for undetectable breakpoints in 32-bit Windows programsโ13Updated 11 years ago
- x64 injector using LoadLibrary made in assembler (MASM)โ26Updated 6 years ago
- Lightweight x86-64 disassembling libraryโ42Updated 2 years ago
- Wow64 syscall hookโ40Updated 8 years ago
- map driver to memoryโ26Updated 6 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.โ72Updated 5 years ago
- Library for reading IDA Pro databases.โ26Updated 4 years ago
- Lisp in kernel-mode because it was so seductiveโ13Updated 4 years ago
- Binary Ninja plugin for automating VMProtect analysisโ61Updated 2 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable โฆโ23Updated 7 years ago
- .lib file for linking against the NT CRTโ19Updated 3 years ago
- โ14Updated 4 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.โ16Updated 3 years ago