Vector35 / sccLinks
☆160Updated last month
Alternatives and similar repositories for scc
Users that are interested in scc are comparing it to the libraries listed below
Sorting:
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆117Updated last week
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆162Updated last year
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆245Updated 4 months ago
- Windows KASLR bypass using prefetch side-channel☆174Updated last year
- bypassing intel txt's tboot integrity checks via coreboot shim☆82Updated 10 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- ☆89Updated 11 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆127Updated last week
- Modular and extensible library for Virtual Machine Introspection☆116Updated 3 weeks ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆161Updated 2 years ago
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆169Updated 5 months ago
- Reimplementation of Microsoft's Warbird obuscator☆177Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆138Updated 3 months ago
- RISC-V Virtual Machine☆278Updated 7 months ago
- ☆93Updated last year
- Binary Ninja plugin to analyze and simplify obfuscated code☆236Updated 3 months ago
- ☆64Updated 11 months ago
- Rust symbol recovery tool☆78Updated 7 months ago
- A high-performance C++ framework for emulating executable binaries☆128Updated 2 months ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- LLVM Pass to save Reverse Engineers from Automation☆112Updated 10 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆109Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆100Updated last month
- Virtual Trust Level (VTL 1) secure call tracing☆86Updated 5 months ago
- binary instrumentation, analysis, and patching framework☆100Updated last week
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆137Updated last year