KiFilterFiberContext / microsoft-warbirdLinks
Reimplementation of Microsoft's Warbird obuscator
☆177Updated last year
Alternatives and similar repositories for microsoft-warbird
Users that are interested in microsoft-warbird are comparing it to the libraries listed below
Sorting:
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆162Updated last year
- Integration of Microsoft Warbird with the MSVC compiler☆127Updated 2 years ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆90Updated last year
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆136Updated 3 years ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated last year
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆109Updated 3 months ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆42Updated 2 months ago
- binary instrumentation, analysis, and patching framework☆100Updated last week
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆119Updated 2 weeks ago
- ☆160Updated last month
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆122Updated this week
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆261Updated 3 years ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- A x86_64 software emulator☆162Updated 5 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆123Updated last year
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 9 months ago
- VMProtect2 Deobfuscation Tooling☆84Updated 2 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆236Updated 3 months ago
- devirtualization vmprotect☆65Updated 2 years ago
- A devirtualization engine for Themida.☆106Updated last year
- monitors hidden syscalls called from call of duty anticheat☆89Updated last year
- Simple, fast and lightweight Header-Only C++ Assembler Library☆132Updated 5 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆67Updated 2 years ago