aaaddress1 / moska
Tiny Windows x86 Assembly Compiler in C++ and Keystone Engine
☆15Updated 4 years ago
Alternatives and similar repositories for moska:
Users that are interested in moska are comparing it to the libraries listed below
- Run some secret code invisible from debugger single step.(x86 process on x64 windows only)☆25Updated 5 years ago
- Plugin for https://github.com/x64dbg/x64dbg☆29Updated 3 months ago
- Windows x86 PE Packer In C++☆52Updated 5 years ago
- A Generic WOW64 Process Blocker☆14Updated 3 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- tool for building windows shellcode in C by MinGW☆52Updated 3 years ago
- ☆14Updated 5 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆28Updated 7 years ago
- Yet another windows syscall library☆18Updated 4 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- This is a POC for loading shared object directly from memory without accessing the actual Linux file system.☆22Updated 4 years ago
- genpatch is IDA plugin that generates a python script for patching binary☆32Updated last year
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Updated 5 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Simple command line version of Sysinternals WinObj. Currently just lists object names and types given an object manager directory.☆20Updated last year
- ☆20Updated 5 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- A compiler for microarchitectural weird machines☆13Updated 8 months ago
- ☆27Updated 9 years ago
- x64dbg scripts for finding OEP of packers☆14Updated 6 years ago
- Full reversing of the Microsoft Auxiliary Windows API Library and ported to C☆24Updated 4 months ago
- SoftICE-like debugger for Windows 2000 and XP. Archived.☆17Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- scripting IDA like a Pro☆24Updated 4 years ago
- Code Integrity Violation Spotter☆16Updated 10 months ago
- Proof of concept headless GUI DLL☆12Updated 3 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago