WitherOrNot / warbird-docsLinks
Documentation of Microsoft's Warbird obfuscation
☆53Updated 11 months ago
Alternatives and similar repositories for warbird-docs
Users that are interested in warbird-docs are comparing it to the libraries listed below
Sorting:
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆120Updated 3 years ago
- Reimplementation of Microsoft's Warbird obuscator☆135Updated last year
- Doom running in the NT kernel☆176Updated 2 years ago
- Defeating WARBIRD obfuscation with one stone☆20Updated 2 years ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆65Updated 3 months ago
- Port of zentool to Windows☆26Updated 5 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆113Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆101Updated 8 months ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆34Updated last year
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆49Updated 3 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- Integration of Microsoft Warbird with the MSVC compiler☆111Updated 2 years ago
- Implementation of a CBS client☆18Updated last year
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆139Updated last year
- ☆39Updated last year
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆28Updated last year
- Collaboration platform for reverse engineering tools.☆41Updated 8 months ago
- Original xbox kernel re-implementation☆42Updated 2 weeks ago
- Undocumented MSVC☆34Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆61Updated last year
- Simple EFI runtime driver that hooks GetVariable function and returns data expected by Windows to make it think that it's running with se…☆193Updated 3 years ago
- Tool for generating C++ classes and json from PDB, DWARF and ELF symbols (Work in progress)☆53Updated 6 years ago
- LLVM Graph View for VSCode☆34Updated 4 months ago
- Lightweight PDB symbol parser and resolver☆26Updated 9 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆52Updated 3 months ago
- alternative smm driver for ryzen motherboards☆157Updated 10 months ago
- The DataExplorer plugin integrates the pattern language from ImHex into x64dbg.☆84Updated 7 months ago
- IDA-names automatically renames pseudocode windows with the current function name.☆58Updated 2 years ago
- WinLicense key extraction via Intel PIN☆102Updated last year
- x86-64 user mode emulation using Zydis☆55Updated this week