backengineering / elderscrollLinks
PDB Rewriting Rust Library
☆25Updated last year
Alternatives and similar repositories for elderscroll
Users that are interested in elderscroll are comparing it to the libraries listed below
Sorting:
- Rust library for lifting raw binary data to LLVM IR☆59Updated 3 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆40Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆23Updated last year
- x86-64 Automated test data generator☆24Updated 2 months ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 2 months ago
- Lightweight PDB symbol parser and resolver☆26Updated 11 months ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆47Updated 4 months ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- Test data for x86 instructions☆13Updated 4 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- x86-64 virtualizing obfuscator written in Rust☆76Updated last year
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆56Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆41Updated 2 weeks ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 5 months ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆43Updated 11 months ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆47Updated this week
- A parser for Microsoft PDB (Program Database) debugging information☆22Updated 11 months ago
- IDA plugin to recover source code from panic information on rust☆17Updated 5 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆83Updated last year
- a parser for the .map file included in the aimware leak☆16Updated 2 years ago
- x86-64 user mode emulation using Zydis☆69Updated last month
- dynamic binary instrumentation, analysis, and patching framework☆95Updated last month
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Updated 11 months ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- A collection of LLVM passes for obfuscating☆37Updated 2 years ago
- Playing with LLVM passes☆37Updated 2 years ago