SamuelTulach / unxorerLinks
Yet another IDA Pro/Home plugin for deobfuscating stack strings
☆79Updated this week
Alternatives and similar repositories for unxorer
Users that are interested in unxorer are comparing it to the libraries listed below
Sorting:
- Binary rewriter for 64-bit PE files.☆84Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆59Updated 11 months ago
- Kernel ReClassEx☆64Updated last year
- Makes IDA (most versions) to crash upon opening it.☆101Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- x86-64 user mode emulation using Zydis☆67Updated 3 weeks ago
- devirtualization vmprotect☆62Updated 2 years ago
- A x86_64 software emulator☆149Updated last month
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- A devirtualization engine for Themida.☆101Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- Windows PDB parser for kernel-mode environment.☆99Updated 3 months ago
- Runtime Hyper-V Hijacking with DDMA☆60Updated last month
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- intel vt-x type 2 hypervisor☆57Updated 5 months ago
- Native opaque predicate cleaner plugin for Binary Ninja☆43Updated last month
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆47Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆42Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- ☆32Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆95Updated 11 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆23Updated last year
- Collection of Cheat dumps for Research and Detection.☆16Updated 2 months ago
- Integration of Microsoft Warbird with the MSVC compiler☆112Updated 2 years ago
- C/C++ antidebugging library for Windows☆39Updated last month