Vector35 / sccLinks
☆155Updated 2 weeks ago
Alternatives and similar repositories for scc
Users that are interested in scc are comparing it to the libraries listed below
Sorting:
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 8 months ago
- Windows KASLR bypass using prefetch side-channel☆164Updated last year
- ☆90Updated 9 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆134Updated last month
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆125Updated last month
- Rewrite and obfuscate code in compiled binaries☆267Updated last month
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆236Updated last month
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆99Updated 6 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆158Updated last year
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated 3 months ago
- RISC-V Virtual Machine☆259Updated 5 months ago
- Rust symbol recovery tool☆75Updated 5 months ago
- Modular and extensible library for Virtual Machine Introspection☆111Updated 3 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆131Updated last year
- ☆63Updated 9 months ago
- A high-performance C++ framework for emulating executable binaries☆127Updated last week
- Binary Ninja plugin to analyze and simplify obfuscated code☆226Updated last month
- Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib☆225Updated 2 weeks ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- dynamic binary instrumentation, analysis, and patching framework☆98Updated 2 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆87Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆70Updated last month
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆114Updated last year
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- ☆95Updated last year
- LLVM Pass to save Reverse Engineers from Automation☆112Updated 8 months ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆49Updated 6 months ago
- Abusing exceptions for code execution.☆113Updated 2 years ago