alexandernst / memory-dumper
A tool for dumping files from processes memory
☆36Updated 6 years ago
Related projects: ⓘ
- Tool to automatically make Cheat Engine attach to a process via the command line.☆26Updated 7 years ago
- Windows memory hacking library☆21Updated 8 years ago
- Minimalistic hooking library written in C☆54Updated 4 years ago
- Binary formats☆24Updated this week
- APIInfo Plugin (x86) - A Plugin For x64dbg☆48Updated 6 years ago
- Improves Hex-Rays output through batch decompilation.☆45Updated 5 years ago
- xLCB plugin for x64dbg☆19Updated 7 years ago
- CopyToAsm (x64) - A Plugin For x64dbg☆29Updated 6 years ago
- A DLL that performs IAT hooking☆26Updated 6 years ago
- CopyToAsm (x86) - A Plugin For x64dbg☆23Updated 6 years ago
- ☆19Updated this week
- Custom LoadLibrary implementation☆53Updated 8 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆35Updated 11 years ago
- Plugin for x64Dbg adding Lua scripting.☆21Updated 5 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 12 years ago
- A simple tool to help reverse engineers while dealing with obfuscated code.☆20Updated 8 years ago
- A tool to monitor how a target process modifies other processes☆24Updated 6 years ago
- IDA plugin to patch IDA Pro in memory.☆48Updated 8 years ago
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆41Updated 6 years ago
- Plugin to label PEB addresses.☆28Updated 7 years ago
- Open Source 64 bit disassembler for Windows☆22Updated 5 years ago
- Plugin for x64dbg☆12Updated 7 years ago
- Standalone DLL that implements LLVM's demangling functionality.☆17Updated 2 years ago
- Native win32 executables loader☆52Updated 6 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆60Updated 7 years ago
- Library and tools to access the executable (EXE) format☆40Updated 2 months ago
- Hides a DLL and associated files based on a FILE_TAG as a user-mode injected DLL.☆20Updated 10 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆24Updated 6 months ago
- find and kill injectedThreads from memory☆10Updated 8 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 5 years ago