OALabs / uwudbg-themeLinks
The best theme for x64dbg!
☆89Updated 3 years ago
Alternatives and similar repositories for uwudbg-theme
Users that are interested in uwudbg-theme are comparing it to the libraries listed below
Sorting:
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆307Updated 2 years ago
- My reversing tools. Some custom, some not.☆210Updated last year
- IDA Pro plugin to make bitfield accesses easier to grep☆248Updated 3 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆157Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆161Updated 3 years ago
- A devirtualization engine for Themida.☆101Updated last year
- Ghetto user mode emulation of Windows kernel drivers.☆149Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated 2 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆100Updated 5 years ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- x86-64 code/pe virtualizer☆203Updated 11 months ago
- An x86-64 Code Virtualizer☆288Updated last year
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆96Updated 2 years ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆129Updated 3 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆63Updated last year
- Debugger Anti-Detection Benchmark☆373Updated 3 months ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆308Updated last year
- A collection of themes based on pastel colors, created for reverse engineers☆152Updated 7 months ago
- x86 PE Mutator☆227Updated 2 years ago
- Collection of hypervisor detections☆277Updated last year
- ☆61Updated 2 years ago
- Shell extension for opening executables in IDA☆191Updated 2 years ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆311Updated last year
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆142Updated 4 years ago
- A x86_64 software emulator☆156Updated 2 months ago
- Reimplementation of Microsoft's Warbird obuscator☆149Updated last year
- Header only wrapper around Hex-Rays API in C++20.☆166Updated 10 months ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆129Updated last year