atom0s / patchLibLinks
A graphics library for creating GUI applications using GDI.
☆13Updated last year
Alternatives and similar repositories for patchLib
Users that are interested in patchLib are comparing it to the libraries listed below
Sorting:
- Debug Print viewer (user and kernel)☆67Updated last year
- Function hooks in Windows NT Kernel☆25Updated 5 years ago
- A C++ wrapper for icedx86 decoder☆34Updated 3 months ago
- Kernel ReClassEx☆64Updated last year
- x86-64 user mode emulation using Zydis☆69Updated last month
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- IDA Map File Symbol Renamer☆22Updated 6 months ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆46Updated last month
- Header-only C++ library for producing PE files.☆34Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- Windows Kernel API wrapper with simplified functions and enterprise driver extensions.☆29Updated 3 months ago
- x86-64 Automated test data generator☆24Updated 2 months ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- Collection of Cheat dumps for Research and Detection.☆16Updated 3 months ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- simple zero-dependency timer implementation☆12Updated 2 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆43Updated 4 years ago
- A PE32/PE32+ parser written in MASM32☆13Updated 9 years ago
- Hypervisor-based debugger for AMD processors☆59Updated last year
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆86Updated last week
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆30Updated 3 years ago
- Reverse Engineering☆13Updated 8 years ago
- Small project to generate fake DLLs based on an executable's import table☆24Updated 5 years ago
- paste string formatted byte data block into x64dbg easy.☆41Updated 4 years ago
- Disk based DMA for ATA and SCSI☆33Updated 2 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- Me fockin' pe protector☆45Updated 2 years ago
- x64dbg python3 plugin☆28Updated this week