WitherOrNot / warbird-docsLinks
Documentation of Microsoft's Warbird obfuscation
☆68Updated last year
Alternatives and similar repositories for warbird-docs
Users that are interested in warbird-docs are comparing it to the libraries listed below
Sorting:
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆136Updated 3 years ago
- Defeating WARBIRD obfuscation with one stone☆43Updated 2 years ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆36Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆89Updated 3 months ago
- Reimplementation of Microsoft's Warbird obuscator☆177Updated last year
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆50Updated 3 years ago
- Doom running in the NT kernel☆177Updated 2 years ago
- Port of zentool to Windows☆27Updated 11 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆90Updated last year
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆38Updated last year
- Integration of Microsoft Warbird with the MSVC compiler☆127Updated 2 years ago
- The DataExplorer plugin integrates the pattern language from ImHex into x64dbg.☆90Updated last year
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆55Updated 9 months ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 6 months ago
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆144Updated last year
- 🔬 IDA plugin to find patched memory☆82Updated 3 weeks ago
- Collaboration platform for reverse engineering tools.☆46Updated last year
- Undocumented MSVC☆40Updated 2 months ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 10 months ago
- IDA-names automatically renames pseudocode windows with the current function name.☆60Updated 3 years ago
- x86-64 user mode emulation using Zydis☆72Updated 4 months ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- Given delta compressed PE files, find download links for them on the Microsoft Symbol Server. No source PE file or VirusTotal access requ…☆44Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Updated last year
- A C++ wrapper for icedx86 decoder☆46Updated 6 months ago
- ☆66Updated 2 years ago
- A x86_64 software emulator☆162Updated 5 months ago
- Lightweight PDB symbol parser and resolver☆27Updated last year
- monitors hidden syscalls called from call of duty anticheat☆89Updated last year
- Original xbox kernel re-implementation☆45Updated last month