android1337 / brkida
C++ macro for x64 programs that breaks ida hex-rays decompiler tool.
☆110Updated last year
Alternatives and similar repositories for brkida:
Users that are interested in brkida are comparing it to the libraries listed below
- Hooking Windows' exception dispatcher to protect process's PML4☆165Updated 2 months ago
- compile-time control flow obfuscation using mba☆182Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆136Updated 8 months ago
- Binary rewriter for 64-bit PE files.☆70Updated last year
- An x86-64 Code Virtualizer☆252Updated 6 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆118Updated last year
- Load dll with undocumented functions and debug symbols☆47Updated 9 months ago
- Kernel ReClassEx☆61Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- nmi stackwalking + module verification☆111Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆123Updated last month
- An x86-64 code virtualizer for VM based obfuscation☆116Updated 4 months ago
- DSE & PG bypass via BYOVD attack☆50Updated last year
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆46Updated last month
- Achieve arbitrary kernel read/writes/function calling in Hypervisor-Protected Code Integrity (HVCI) protected environments calling withou…☆198Updated 5 months ago
- Makes IDA (most versions) to crash upon opening it.☆86Updated 7 months ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆86Updated last year
- monitors hidden syscalls called from call of duty anticheat☆73Updated 3 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated 2 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆182Updated last year
- Using Windows' own bootloader as a shim to bypass Secure Boot☆169Updated 9 months ago
- x86-64 virtualizing obfuscator written in Rust☆75Updated last year
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆59Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.☆85Updated 6 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆110Updated last year
- PoC Anti-Rootkit/Anti-Cheat Driver.☆189Updated 7 months ago
- Collection of hypervisor detections☆232Updated 6 months ago
- Header-only C++ library for producing PE files.☆32Updated last year
- A proof of concept demonstrating instrumentation callbacks on Windows 10 21h1 with a TLS variable to ensure all syscalls are caught.☆127Updated 3 years ago