Run iOS on Android! (QEMU-s5l89xx-port)
☆90Nov 5, 2013Updated 12 years ago
Alternatives and similar repositories for iVM
Users that are interested in iVM are comparing it to the libraries listed below
Sorting:
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- A system call tracer☆10Sep 22, 2014Updated 11 years ago
- Malware monitor template based on MinHook☆17Mar 29, 2015Updated 10 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Nov 9, 2015Updated 10 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13May 15, 2014Updated 11 years ago
- Framework for vulnerability fuzzing and reverse-engineering tool development.☆23Jul 25, 2023Updated 2 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Microsoft Windows real time file integrity monitoring and filtering using minifilter technology, this is was my university final project☆11Oct 17, 2014Updated 11 years ago
- ☆13Jun 20, 2013Updated 12 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- ☆13Jul 31, 2016Updated 9 years ago
- 使用python加密so,C动态解密调用☆17Apr 27, 2017Updated 8 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- Hyper-V virtual switch packet capturing extension with libpcap / Wireshark format☆13Jun 3, 2014Updated 11 years ago
- IDA Pro Scripts☆37Feb 24, 2015Updated 11 years ago
- A combination of an IDAPython Plugin and a control version system that result in a new reverse engineering collaborative addon for IDA Pr…☆91Jul 27, 2016Updated 9 years ago
- ☆12Dec 17, 2016Updated 9 years ago
- A Public-domain C header file for x86 MSR (Model Specific Register) addresses, and a naive generator of it.☆14Dec 17, 2017Updated 8 years ago
- IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code i…☆46Sep 2, 2014Updated 11 years ago
- ☆24Apr 11, 2017Updated 8 years ago
- ☆14Feb 27, 2017Updated 9 years ago
- rebuild ollydbg☆20Feb 15, 2017Updated 9 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Mar 2, 2017Updated 9 years ago
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago