Dump-GUY / IDA_PHNT_TYPESLinks
Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).
☆160Updated last year
Alternatives and similar repositories for IDA_PHNT_TYPES
Users that are interested in IDA_PHNT_TYPES are comparing it to the libraries listed below
Sorting:
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆85Updated 2 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆159Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆115Updated last week
- A x86_64 software emulator☆161Updated 4 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆238Updated 2 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 4 months ago
- Integration of Microsoft Warbird with the MSVC compiler☆116Updated 2 years ago
- Single header version of System Informer's phnt library.☆240Updated last week
- ☆93Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆108Updated 3 years ago
- A devirtualization engine for Themida.☆105Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆158Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆131Updated 2 years ago
- An x86-64 code virtualizer for VM based obfuscation☆160Updated last year
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Debugger Anti-Detection Benchmark☆380Updated this week
- Easy-to-use IDA plugin for code emulation☆51Updated last month
- C++ library for parsing and manipulating PE files statically and dynamically.☆89Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆258Updated 3 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆114Updated 3 weeks ago
- dynamic binary instrumentation, analysis, and patching framework☆99Updated last week
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆162Updated 3 years ago
- ☆148Updated 2 years ago
- ☆124Updated 5 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆248Updated last year