KiFilterFiberContext / microsoft-warbirdLinks
Reimplementation of Microsoft's Warbird obuscator
☆133Updated last year
Alternatives and similar repositories for microsoft-warbird
Users that are interested in microsoft-warbird are comparing it to the libraries listed below
Sorting:
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆146Updated 11 months ago
- Integration of Microsoft Warbird with the MSVC compiler☆109Updated 2 years ago
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆118Updated 2 years ago
- WinLicense key extraction via Intel PIN☆102Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated 7 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆113Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆91Updated 2 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- A devirtualization engine for Themida.☆100Updated last year
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆152Updated last year
- ☆151Updated this week
- Makes IDA (most versions) to crash upon opening it.☆97Updated 11 months ago
- compile-time control flow obfuscation using mba☆190Updated 2 years ago
- A x86_64 software emulator☆142Updated last week
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆61Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆124Updated last year
- Rewrite and obfuscate code in compiled binaries☆208Updated last week
- monitors hidden syscalls called from call of duty anticheat☆82Updated 6 months ago
- IDA Type Info Libraries for RE☆31Updated 6 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆251Updated 2 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆34Updated last year
- Simple, fast and lightweight Header-Only C++ Assembler Library☆89Updated last month
- Lightweight PDB symbol parser and resolver☆26Updated 9 months ago
- dynamic binary instrumentation, analysis, and patching framework☆73Updated 2 weeks ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆77Updated 4 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆161Updated last month
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- x86/x64 Ring 0/-2 System Freezer/Debugger☆118Updated 2 months ago
- A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instruct…☆70Updated this week