Automatic vtable detection, inheritance analysis, and function override tracking for reverse engineering compiled C++ binaries. Supports IDA Pro 9+ on any OS
☆125Mar 13, 2026Updated last week
Alternatives and similar repositories for IDA-VTableExplorer
Users that are interested in IDA-VTableExplorer are comparing it to the libraries listed below
Sorting:
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆95Dec 22, 2025Updated 3 months ago
- A custom tool to unpack VMProtect-obfuscated executables and restore the original binary☆37Jul 30, 2025Updated 7 months ago
- hide data in no_access memory pages☆13Jun 5, 2024Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆129Mar 6, 2026Updated 2 weeks ago
- Windows kernel driver that detects hypervisors by probing SIDT/LIDT edge cases, paging/TLB behaviors, privilege transitions, and timing e…☆37Mar 3, 2026Updated 2 weeks ago
- UnidbgTraceViewer☆31Jan 20, 2026Updated 2 months ago
- ☆65Feb 15, 2026Updated last month
- Undocumented MSVC☆45Nov 10, 2025Updated 4 months ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Aug 28, 2021Updated 4 years ago
- Zyrox: LLVM based, compile-time obfuscator plugin.☆91Feb 21, 2026Updated last month
- Parsing Valve KeyValues text formatting for easy use in nodejs and browsers☆14Dec 3, 2024Updated last year
- choose demo☆21Nov 6, 2025Updated 4 months ago
- 🔬 IDA plugin to find patched memory☆85Mar 1, 2026Updated 3 weeks ago
- Multi-Layer Automata-Based Encryption strings☆25Jul 9, 2024Updated last year
- [WIP] claude opus x86_64 disassembler/lifter/recompiler☆33Feb 12, 2026Updated last month
- ARM64 ELF Virtual Machine Protection System☆295Mar 15, 2026Updated last week
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆318Nov 20, 2025Updated 4 months ago
- An advanced singular header-only C++20 obfuscation library with encryption and polymorphism.☆83Mar 14, 2026Updated last week
- Using the peculiar behaviour of the VPGATHER instructions to determine if an address will fault before it is truly accessed. All done in …☆55Dec 30, 2025Updated 2 months ago
- PoC demonstrating the usage of undocumented Process Instrumentation Callback for intercepting kernel-to-user transitions (Syscalls, APCs,…☆34Nov 28, 2025Updated 3 months ago
- ntos shit☆29Feb 15, 2024Updated 2 years ago
- ☆10Jan 7, 2016Updated 10 years ago
- RGLoader☆15Jun 27, 2024Updated last year
- ☆24Jul 15, 2023Updated 2 years ago
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆91Feb 1, 2026Updated last month
- A lock-free, high-performance logging system designed for Windows kernel drivers☆26Mar 11, 2025Updated last year
- Hook syscalls from ring0 without triggering PatchGuard☆24Oct 29, 2025Updated 4 months ago
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆73Updated this week
- ☆23Oct 15, 2024Updated last year
- anti cheat drv open source☆19Apr 18, 2024Updated last year
- The trashvisor☆12Oct 25, 2020Updated 5 years ago
- ☆14Feb 25, 2015Updated 11 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆68Jan 23, 2023Updated 3 years ago
- ❄ImGui, Gaussian Blur, OpenCV, DirectX11☆20Aug 12, 2024Updated last year
- ☆19Oct 25, 2024Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆177Dec 21, 2024Updated last year
- 通过tweak注入动态库☆10Jan 15, 2025Updated last year
- PoC kernel to usermode injection☆106Feb 26, 2024Updated 2 years ago
- minimal hypervisor for aarch64 (WIP)☆31Nov 29, 2025Updated 3 months ago