WitherOrNot / warbird-docs
Documentation of Microsoft's Warbird obfuscation
☆50Updated 8 months ago
Alternatives and similar repositories for warbird-docs:
Users that are interested in warbird-docs are comparing it to the libraries listed below
- Research on obfuscated licensing APIs / CLIP service in the Windows kernel☆111Updated 2 years ago
- Defeating WARBIRD obfuscation with one stone☆19Updated last year
- Class Informer updated for 32bit targets in 64bit IDA 8.2+/9.0/9.1☆60Updated 3 weeks ago
- Given delta compressed PE files, find download links for them on the Microsoft Symbol Server. No source PE file or VirusTotal access requ…☆30Updated last year
- Take back control of Windows Code Integrity, no exploits or patching required! Requires that you control your own Platform Key (PK).☆43Updated 2 years ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆110Updated last year
- x86-64 user mode emulation using Zydis☆46Updated 3 months ago
- Implementation of a CBS client☆16Updated 9 months ago
- Collaboration platform for reverse engineering tools.☆40Updated 4 months ago
- IDA-names automatically renames pseudocode windows with the current function name.☆55Updated 2 years ago
- The DataExplorer plugin integrates the pattern language from ImHex into x64dbg.☆79Updated 3 months ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆45Updated this week
- ☆18Updated 7 years ago
- A PlayStation 4 Kernel Debugger [WIP]☆29Updated 7 months ago
- Lightweight PDB symbol parser and resolver☆24Updated 6 months ago
- Port of zentool to Windows☆24Updated 2 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆79Updated 9 months ago
- Original xbox kernel re-implementation☆36Updated 3 weeks ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆97Updated 5 months ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- NoMoreBugCheck Reloaded☆13Updated 4 months ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Reimplementation of Microsoft's Warbird obuscator☆124Updated 10 months ago
- Generate a PDB file given the old PDB file and an address mapping☆47Updated last month
- IDA's Lumina feature, reimplemented for Binary Ninja, with new error handeling!☆37Updated 5 months ago
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆135Updated 10 months ago
- ☆66Updated last month
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆58Updated last year
- ☆30Updated 2 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆59Updated 9 months ago