☆58Feb 27, 2020Updated 6 years ago
Alternatives and similar repositories for ida-pro-junk-code-removal
Users that are interested in ida-pro-junk-code-removal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Disable threat tracing from the kernel..☆15Apr 8, 2022Updated 4 years ago
- Intel learning hypervisor and some extend function☆21Aug 23, 2025Updated 8 months ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Aug 27, 2022Updated 3 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆53Apr 7, 2022Updated 4 years ago
- Workshop Material on VM-based Deobfuscation☆204Oct 20, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- this application shows EAC sdk's memory leak.☆10Nov 30, 2021Updated 4 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34May 15, 2022Updated 4 years ago
- Minimalistic hooking library using GameOverlayRenderer.☆24Nov 26, 2020Updated 5 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆202Jul 11, 2023Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆150Jun 30, 2022Updated 3 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- ☆20May 17, 2022Updated 4 years ago
- Devirtualizer for VirtualGuard Protector using AsmResolver☆42May 8, 2023Updated 3 years ago
- Analyzing the driver and internal module of EasyAntiCheat.☆40May 1, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆31Jan 12, 2022Updated 4 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆73Oct 7, 2022Updated 3 years ago
- ☆19Jun 13, 2022Updated 3 years ago
- This is just a x64dbg script system support.☆46Jul 6, 2022Updated 3 years ago
- ☆439Jan 1, 2025Updated last year
- 09/2021 reversal of EasyAntiCheat driver☆243Dec 21, 2021Updated 4 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 4 years ago
- A deobfuscation plugin for IDA☆70Jul 9, 2022Updated 3 years ago
- RISC-V Disassembler☆18Aug 25, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- direct systemcalls with a modern c++20 interface.☆45Jan 6, 2023Updated 3 years ago
- ☆74Aug 31, 2022Updated 3 years ago
- capcom-like executor for any physmem driver☆57Jan 6, 2022Updated 4 years ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago
- ☆54Oct 16, 2021Updated 4 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆82Oct 6, 2022Updated 3 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆37Oct 11, 2023Updated 2 years ago
- ☆46Feb 27, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆88Mar 16, 2021Updated 5 years ago
- ☆223May 10, 2022Updated 4 years ago
- PoC for a taint based attack on VMProtect☆125Jul 3, 2019Updated 6 years ago
- Visual Studio template for GNU-EFI☆17May 16, 2022Updated 4 years ago
- ☆14Jul 28, 2018Updated 7 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆111Aug 3, 2023Updated 2 years ago
- ☆57Jun 21, 2022Updated 3 years ago