Squalr / Self-Modifying-CodeLinks
C++ Self Modifying Code (Self Assembing/Disassembling)
☆73Updated 5 years ago
Alternatives and similar repositories for Self-Modifying-Code
Users that are interested in Self-Modifying-Code are comparing it to the libraries listed below
Sorting:
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆74Updated 7 years ago
- API monitoring via return-hijacking thunks; works without information about target function prototypes.☆118Updated 5 years ago
- Experiments on C/C++ Exploits☆22Updated 5 years ago
- Smallest possible PE files. Artisanal, hand-crafted with love and care.☆38Updated 5 years ago
- A local copy of Alex Ionescu's seemingly abandoned native-nt-toolkit project containing knowledge inherited from the ReactOS project.☆54Updated 6 years ago
- Plugin of x64dbg to help you analyze object-oriented applications☆25Updated 5 years ago
- ☆108Updated 7 years ago
- x86-64 virtual machine and disassembler☆147Updated 6 years ago
- This project aims to facilitate debugging a kernel driver in windows by adding support for a code change on the fly without reboot/unload…☆171Updated 2 years ago
- ☆72Updated 11 years ago
- executing JS from x86 code☆27Updated 6 years ago
- Enumerate user mode shared memory mappings on Windows.☆125Updated 4 years ago
- Architectural privilege escalation on x86☆60Updated 7 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 9 years ago
- reverse engineering extension plugin for windbg☆120Updated 6 years ago
- ☆35Updated 3 years ago
- A simple password-based PE encryptor for Windows 32-bit executables.☆53Updated 10 months ago
- Psychological warfare in reverse engineering☆196Updated 7 years ago
- Simple tool that allows you to have multiple Just-In-Time debuggers at once.☆95Updated 11 months ago
- Windows 10 PE image loader (LDR) NTDLL component toolbox☆49Updated 6 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- C++11 RAII memory patcher and function hooking thing☆34Updated 9 years ago
- Lifting from native architecture to VTIL. (WIP)☆76Updated 3 years ago
- ReactOS x86-32 syscall fuzzer☆58Updated 4 months ago
- x64dbg Dark Theme - Own use☆31Updated 6 years ago
- The most trivial virtual machine that can run a few x86 machine code instructions.☆26Updated 8 years ago
- .NET Tool for parsing and utilizing x86 semantics defined in K. It currently features a WIP symbolic expression generator for VTIL.☆16Updated 4 years ago
- 🧶 The Win32 usermode threading library with UMS/fibers/threads support☆30Updated 6 years ago
- Binary formats☆29Updated this week
- Inject code into a legitimate process☆145Updated 10 years ago