CZashi / win-reverseLinks
ntos shit
☆26Updated last year
Alternatives and similar repositories for win-reverse
Users that are interested in win-reverse are comparing it to the libraries listed below
Sorting:
- ☆26Updated last year
- 这篇文章的目的是介绍一款实验性项目基于COM命名管道或者Windows Hyper-V虚拟机Vmbus通道实现的运行在uefi上的windbg调试引擎开发心得☆42Updated last year
- WinDbg-Samples ExdiGdbSrv fork 修复了一部分Vmware调试的问题☆30Updated 2 years ago
- Code virtualizer☆25Updated 9 years ago
- ☆23Updated 2 years ago
- Open Anti Cheat☆27Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆45Updated 2 years ago
- ☆28Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Binary DisASseMbler☆24Updated 2 years ago
- windows kernel pagehook☆40Updated 2 years ago
- ☆37Updated 4 years ago
- Binary Ninja plugin for automating VMProtect analysis☆62Updated 2 years ago
- Static Library For Windows Drivers☆36Updated 2 weeks ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- vmp2.x devirtualization☆77Updated 10 months ago
- Native API header files for the Process Hacker project (nightly).☆26Updated last week
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Updated 3 years ago
- 巨硬☆16Updated last year
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆42Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- Windows Console Monitor☆34Updated 6 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆20Updated 8 months ago
- direct systemcalls with a modern c++20 interface.☆44Updated 2 years ago
- A basic Secure Virtual Machine hypervisor☆25Updated 4 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆40Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago