Window Executable file Function tracer using Debugging API
☆44Sep 26, 2019Updated 6 years ago
Alternatives and similar repositories for WindowFunctionTracer
Users that are interested in WindowFunctionTracer are comparing it to the libraries listed below
Sorting:
- Trace events in real time sessions☆47Aug 25, 2023Updated 2 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- XDV is disassembler or debugger that works based on the extension plugin.☆55Sep 3, 2019Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Jun 11, 2019Updated 6 years ago
- ☆36Oct 29, 2020Updated 5 years ago
- Hide codes/data in the kernel address space.☆188May 8, 2021Updated 4 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Branch based windows debugger☆22Jul 30, 2019Updated 6 years ago
- PoC for a taint based attack on VMProtect☆123Jul 3, 2019Updated 6 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Frida Python Tool☆14Sep 29, 2020Updated 5 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆15Nov 6, 2017Updated 8 years ago
- the basic version of the ring0 physical memory read/write tool☆92Aug 18, 2019Updated 6 years ago
- A quick-and-dirty anti-hook library proof of concept.☆105Aug 29, 2018Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago
- ☆16Jan 27, 2019Updated 7 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆18Jul 2, 2022Updated 3 years ago
- Simple demo of accessing System Management BIOS in UEFI environment.☆14Oct 13, 2020Updated 5 years ago
- ☆14May 9, 2017Updated 8 years ago
- MircoSoft Detours 4.0.1,MIT License,Support X86,X64,ARM,IA64☆12Apr 23, 2018Updated 7 years ago
- A poc of embedding x64 code into x86 PE file☆20Sep 25, 2019Updated 6 years ago
- A driver that hooks C: volume using symbolic link callback to track all FS access to the volume☆110Apr 24, 2020Updated 5 years ago
- x64 syscall caller in C++.☆93Jun 23, 2018Updated 7 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆13Jan 2, 2018Updated 8 years ago
- OUTDATED☆11Mar 8, 2020Updated 5 years ago
- A blanket execution/min hash semantic hash tool for binary function identification☆18Apr 22, 2016Updated 9 years ago
- hook detector using emulation and comparing static with dynamic outputs☆17Aug 11, 2023Updated 2 years ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Sep 5, 2020Updated 5 years ago
- Just another tool to download specify Symbol (.pdb) files☆39Sep 4, 2019Updated 6 years ago