Deniskore / nand_norLinks
C++ Compile time NAND/NOR obfuscation
☆51Updated 5 years ago
Alternatives and similar repositories for nand_nor
Users that are interested in nand_nor are comparing it to the libraries listed below
Sorting:
- A c++20 constexpr x86 assembler☆58Updated 3 years ago
- Lightweight x86-64 disassembling library☆42Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- Hide function calls to prevent reverse-engineering☆71Updated 4 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆16Updated 3 years ago
- Code virtualizer☆24Updated 9 years ago
- Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and …☆70Updated 9 months ago
- LLVM based obfuscator☆58Updated 3 years ago
- The most trivial virtual machine that can run a few x86 machine code instructions.☆26Updated 8 years ago
- A bunch of architectural headers for i386 and AMD64☆40Updated last year
- Fetch PDB symbols directly from Microsoft's symbol servers☆42Updated 3 years ago
- Implementation of a dispatcher for Structured Exceptions inside a Vectored Exception Handler☆41Updated 5 years ago
- Native API header files for the Process Hacker project (nightly).☆26Updated last week
- Debug Print viewer (user and kernel)☆66Updated last year
- ☆47Updated 3 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆85Updated 10 years ago
- Parser for Microsoft Program Database (PDB) files☆76Updated 5 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- A simple library which provides a way to read and write the memory of other processes☆51Updated 7 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆47Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- Automatically exported from code.google.com/p/portable-executable-library☆23Updated 9 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆71Updated last year
- A Windows API hooking library !☆31Updated 2 years ago
- Example of using Windows Platform Binary Table (WPBT)☆22Updated last year
- Intercepting DeviceControl via WPP☆134Updated 5 years ago