Luiz-Monad / papersLinks
☆18Updated 5 years ago
Alternatives and similar repositories for papers
Users that are interested in papers are comparing it to the libraries listed below
Sorting:
- Test data for x86 instructions☆13Updated 4 years ago
- Binary rewriter for 64-bit PE files.☆99Updated 2 years ago
- Windows PDB parser for kernel-mode environment.☆104Updated 8 months ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Updated 2 years ago
- Windows kernel driver template for cmkr (with testsigning).☆36Updated 2 years ago
- Hijacking Hyper-V at Runtime with DDMA☆76Updated 5 months ago
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆67Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆67Updated 2 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Updated 3 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Updated 2 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆79Updated 3 years ago
- Kernel ReClassEx☆66Updated 2 years ago
- Pure Go port of Hacker Disassembler Engine.☆25Updated 11 months ago
- A devirtualization engine for Themida.☆106Updated last year
- Python bindings for the Icicle emulator.☆41Updated 3 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆59Updated 2 years ago
- A small tool for rapid enumeration of CPUID, and MSR fields.☆29Updated 2 years ago
- devirtualization vmprotect☆65Updated 2 years ago
- intel vt-x type 2 hypervisor☆61Updated 9 months ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Easy-to-use IDA plugin for code emulation☆53Updated 2 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆92Updated 3 months ago
- ☆32Updated 3 years ago
- an IDA Pro Plugin to detect common Anti-Cheat Artifacts☆91Updated last month
- Analyzing the driver and internal module of EasyAntiCheat.☆40Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆31Updated last year
- x86-64 user mode emulation using Zydis☆72Updated 5 months ago
- Lightweight x86-64 instruction length disassembler (LDE)☆34Updated 2 years ago