android1337 / brkidaLinks
C++ macro for x64 programs that breaks ida hex-rays decompiler tool.
☆137Updated last year
Alternatives and similar repositories for brkida
Users that are interested in brkida are comparing it to the libraries listed below
Sorting:
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 5 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆215Updated 11 months ago
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆236Updated 2 months ago
- compile-time control flow obfuscation using mba☆199Updated 2 years ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- An x86-64 code virtualizer for VM based obfuscation☆158Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆115Updated this week
- A x86_64 software emulator☆160Updated 4 months ago
- Binary rewriter for 64-bit PE files.☆92Updated last year
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆131Updated 2 years ago
- An x86-64 Code Virtualizer☆299Updated last year
- Load dll with undocumented functions and debug symbols☆47Updated last year
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆60Updated last year
- A devirtualization engine for Themida.☆105Updated last year
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆156Updated 2 years ago
- Anti-Rootkit/Anti-Cheat Driver to uncover unbacked or hidden kernel code.☆274Updated last month
- nmi stackwalking + module verification☆153Updated 2 years ago
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆248Updated last year
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆91Updated 2 months ago
- ntoskrnl .data hooks for UM-KM communication☆52Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆80Updated 2 months ago
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆113Updated last year
- ☆45Updated 11 months ago
- Kernel ReClassEx☆66Updated 2 years ago
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆151Updated 4 years ago
- Windows PDB parser for kernel-mode environment.☆103Updated 7 months ago
- ☆63Updated 2 years ago
- Translate virtual addresses to physical addresses from usermode.☆78Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆160Updated last year