Vector35 / sccLinks
☆154Updated 2 months ago
Alternatives and similar repositories for scc
Users that are interested in scc are comparing it to the libraries listed below
Sorting:
- Rewrite and obfuscate code in compiled binaries☆259Updated last week
- NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (eithe…☆228Updated 2 weeks ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- Modular and extensible library for Virtual Machine Introspection☆110Updated 2 months ago
- Windows KASLR bypass using prefetch side-channel☆131Updated last year
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated last week
- The Windbg extensions to study Hyper-V on Intel and AMD processors.☆167Updated last month
- ☆90Updated 8 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆153Updated last year
- Reimplementation of Microsoft's Warbird obuscator☆150Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆96Updated 4 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆132Updated this week
- A high-performance C++ framework for emulating executable binaries☆105Updated 2 weeks ago
- ☆60Updated 8 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- compile-time control flow obfuscation using mba☆194Updated 2 years ago
- ☆94Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆47Updated last week
- Binary Ninja plugin to analyze and simplify obfuscated code☆216Updated last week
- Virtual Trust Level (VTL 1) secure call tracing☆80Updated last month
- Rust symbol recovery tool☆72Updated 3 months ago
- RISC-V Virtual Machine☆253Updated 4 months ago
- Windows 11 24H2 Runtime PatchGuard Bypass☆199Updated last week
- Contains all the applications developed for the Second part of the 7th Edition of Windows Internals book☆113Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated last year
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆49Updated 5 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆93Updated 3 weeks ago