SouhailHammou / Custom-VMLinks
Virtual machine with a custom instruction set in C
☆16Updated 7 years ago
Alternatives and similar repositories for Custom-VM
Users that are interested in Custom-VM are comparing it to the libraries listed below
Sorting:
- Personal curation of Clang/LLVM patches.☆12Updated 4 years ago
- RISC-V Disassembler☆18Updated 5 years ago
- LLVM based devirtualization PoC’s.☆21Updated 3 years ago
- Figuring out the cause of a handle downgrade☆24Updated 2 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Analysing and defeating PatchGuard universally☆36Updated 5 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- ☆31Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆33Updated 5 years ago
- Remote memory library in C++17.☆33Updated 7 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- Lightweight x86-64 disassembling library☆44Updated 3 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆17Updated 3 years ago
- Static library and headers for linking your software with ntdll.dll☆37Updated 5 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- Virtual Tagger Plugin is a Cutter plugin that significantly improves handling and analysis of vtables and virtual functions☆15Updated 2 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 4 years ago
- Analyze PatchGuard☆57Updated 7 years ago
- win32/x64 obfuscate framework☆33Updated 6 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Updated 4 months ago
- A copy of my Mathematics and Computer Engineering B.Sc. thesis☆20Updated 4 years ago
- x86_64, PE32+, FAT32 bootloader☆26Updated 4 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Updated 8 years ago
- An obfuscator bases on llvm for multiple language and platform☆19Updated 8 years ago
- ☆30Updated 4 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Updated 4 years ago