Wenzel / pyvmidbg
LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger
☆216Updated 4 years ago
Alternatives and similar repositories for pyvmidbg:
Users that are interested in pyvmidbg are comparing it to the libraries listed below
- Hypervisor-Level Debugger based on Radare2 / LibVMI, using VMI IO and debug plugins☆133Updated 6 years ago
- A hypervisor for fuzzing built with WHVP and Bochs☆372Updated 6 years ago
- ☆173Updated 2 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆430Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆202Updated 11 months ago
- Hypervisor-based debugger☆187Updated 4 years ago
- grap: define and match graph patterns within binaries☆154Updated 2 years ago
- IDA Pro plugin to assist with complex graphs☆315Updated last year
- a bare metal (type 1) VMM (hypervisor) with a python remote control API☆181Updated 7 years ago
- IDA Signsrch☆156Updated 9 years ago
- Binary code coverage visualizer plugin for Ghidra☆289Updated 8 months ago
- TLB splitting VMM☆164Updated 8 years ago
- The Windows Library for Intel Process Trace (WinIPT) is a project that leverages the new Intel Processor Trace functionality exposed by W…☆377Updated last year
- Ghidra Program Analysis Library☆332Updated last year
- ☆177Updated 6 years ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated 7 months ago
- A Bochs-based instrumentation project designed to log kernel memory references, to identify "double fetches" and other OS vulnerabilities☆334Updated 5 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆245Updated 7 years ago
- grap: define and match graph patterns within binaries☆170Updated 4 years ago
- This driver implements the Intel Processor Trace functionality in Intel Skylake architecture for Microsoft Windows☆435Updated 6 years ago
- ☆105Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆226Updated 4 years ago
- The history of Windows Internals via symbols.☆177Updated 3 years ago
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆301Updated 6 years ago
- A Miasm2 based function divination.☆536Updated 4 years ago
- Python scripts for reverse engineering.☆182Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 7 years ago
- A cross-platform unified Virtual Machine Introspection API library☆174Updated last week
- Toolkit for enriching and speeding up static malware analysis☆167Updated 3 years ago
- Reverse engineering tool for automatic structure recovering and memory use analysis based on DynamoRIO and Capstone☆319Updated 5 years ago