backengineering / elderscroll
PDB Rewriting Rust Library
☆23Updated 9 months ago
Alternatives and similar repositories for elderscroll:
Users that are interested in elderscroll are comparing it to the libraries listed below
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆33Updated last year
- Rust library for lifting raw binary data to LLVM IR☆44Updated this week
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- A VMWare logger using built-in backdoor.☆27Updated 4 months ago
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆50Updated 6 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 6 months ago
- Symbolic Execution based on lifting amd64 to z3☆26Updated 7 months ago
- A minimalistic logger for Windows Kernel Drivers.☆20Updated 11 months ago
- Me fockin' pe protector☆44Updated 2 years ago
- Test data for x86 instructions☆13Updated 3 years ago
- Lightweight PDB symbol parser and resolver☆24Updated 3 months ago
- Disassembler for Zeus VM custom instruction set☆27Updated last year
- x86-64 user mode emulation using Zydis☆44Updated last month
- Playing with LLVM passes☆36Updated last year
- A thin introspection hypervisor framework that allows for low level resource manipulation.☆13Updated last year
- Easily search LLVM headers for all major versions!☆19Updated 2 weeks ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- ☆19Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- EDR PoC WIP LLC☆10Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆27Updated 3 months ago
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆15Updated 8 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆32Updated 5 months ago
- reverse engineering of the windows nt kernel debugger protocol & reimplementation.☆22Updated 7 months ago
- ☆15Updated last year
- Python bindings for the Icicle emulator.☆25Updated last month
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆43Updated last month