backengineering / sigbreaker-llvm-litLinks
All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit
☆16Updated 3 weeks ago
Alternatives and similar repositories for sigbreaker-llvm-lit
Users that are interested in sigbreaker-llvm-lit are comparing it to the libraries listed below
Sorting:
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆20Updated 3 weeks ago
- PDB Rewriting Rust Library☆24Updated last year
- A VMWare logger using built-in backdoor.☆29Updated 7 months ago
- PEIM (UEFI) bootkit targeting OVMF (EDK2)☆35Updated last year
- Generate a PDB file given the old PDB file and an address mapping☆48Updated 2 months ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆55Updated 2 years ago
- Me fockin' pe protector☆45Updated 2 years ago
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆40Updated 6 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆123Updated 2 weeks ago
- A minimalistic logger for Windows Kernel Drivers.☆23Updated last year
- Elevate arbitrary MSR writes to kernel execution.☆36Updated last year
- A large collection of 32bit and 64bit PE files useful for verifying the correctness of bin2bin transformations☆54Updated 10 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 9 months ago
- Finding Truth in the Shadows☆92Updated 2 years ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆65Updated 2 months ago
- Compileable POC of namazso's x64 return address spoofer.☆52Updated 4 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆19Updated last year
- Rust library for lifting raw binary data to LLVM IR☆51Updated last month
- C/C++ antidebugging library for Windows☆21Updated 4 months ago
- Symbolic Execution based on lifting amd64 to z3☆27Updated 11 months ago
- ANY.RUN sandbox detection collection☆19Updated 9 months ago
- ☆90Updated last year
- Report and exploit of CVE-2024-21305.☆34Updated last year
- Provides commands to read from and write to arbitrary kernel-mode memory for users with the Administrator privilege. HVCI compatible. No …☆18Updated 11 months ago
- Collection of Cheat dumps for Research and Detection.☆14Updated this week
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 2 months ago
- x86-64 Automated test data generator☆22Updated 4 months ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆34Updated last month
- Lightweight PDB symbol parser and resolver☆24Updated 7 months ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆29Updated 2 years ago