Luiz-Monad / papersLinks
☆16Updated 5 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below
Sorting:
- Simple, fast and lightweight Header-Only C++ Assembler Library☆98Updated this week
- Windows PDB parser for kernel-mode environment.☆100Updated 2 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆57Updated 9 months ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆156Updated 5 months ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆26Updated last year
- Windows kernel driver template for cmkr (with testsigning).☆37Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆85Updated last year
- Kernel ReClassEx☆64Updated last year
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆72Updated last year
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆54Updated last year
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 2 years ago
- Pure Go port of Hacker Disassembler Engine.☆25Updated 5 months ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 5 months ago
- A devirtualization engine for Themida.☆100Updated last year
- intel vt-x type 2 hypervisor☆56Updated 3 months ago
- A small tool for rapid enumeration of CPUID, and MSR fields.☆27Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆127Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆110Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆124Updated last year
- x64 PE-COFF virtualization driven obfuscation engine☆58Updated 2 years ago
- A simple plugin for working with Swift Strings, optimized Swift Strings, and Swift Arrays during the reverse engineering of iOS binaries …☆15Updated 2 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆61Updated last year
- Rewrite and obfuscate code in compiled binaries☆214Updated last week
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 4 months ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆189Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆98Updated 2 years ago
- ☆26Updated 9 months ago
- nmi stackwalking + module verification☆129Updated last year