RomanRybachek / Copy_RVALinks
Plugin for ida pro that copies RVA under cursor to clipboard.
☆14Updated 2 years ago
Alternatives and similar repositories for Copy_RVA
Users that are interested in Copy_RVA are comparing it to the libraries listed below
Sorting:
- IDA Map File Symbol Renamer☆22Updated 5 months ago
- x64dbg python3 plugin☆27Updated last month
- ☆26Updated 2 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- The updated PE file manipulation library from RetDec project.☆21Updated last year
- Test data for x86 instructions☆13Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- ☆23Updated last month
- A Windows API hooking library !☆32Updated 3 years ago
- ☆30Updated 3 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆26Updated 2 years ago
- Code virtualizer☆25Updated 9 years ago
- Collaboration platform for reverse engineering tools.☆42Updated 8 months ago
- ☆33Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆62Updated 2 years ago
- Small project to generate fake DLLs based on an executable's import table☆23Updated 5 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- paste string formatted byte data block into x64dbg easy.☆41Updated 4 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- IDA plugin for analyzing, filtering and tracing functions and call flows☆15Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- ☆37Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆42Updated 4 years ago
- ☆22Updated last year
- x86-64 user mode emulation using Zydis☆66Updated this week