bilka00 / vmprotect_import_fixer
Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)
☆17Updated 3 years ago
Alternatives and similar repositories for vmprotect_import_fixer:
Users that are interested in vmprotect_import_fixer are comparing it to the libraries listed below
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆22Updated last year
- ☆36Updated 2 years ago
- ☆36Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- A demonstration of hooking into the VMProtect-2 virtual machine☆17Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆48Updated 3 years ago
- My research WIP bluepill hypervisor☆41Updated last year
- ☆15Updated last year
- Code virtualizer☆23Updated 8 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 5 months ago
- ☆26Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆24Updated last year
- Experiment building lifting-bits dependencies with pure CMake. Migrated to:☆21Updated 4 months ago
- pointer obfuscation☆24Updated 6 years ago
- ☆22Updated 11 months ago
- ☆30Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- ☆21Updated last year
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆42Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- EDR PoC WIP LLC☆10Updated last year
- x64 assembler library☆31Updated 8 months ago
- An example code of CiGetCertPublisherName☆14Updated 2 years ago
- Single header library to simplify the usage of direct syscalls. x64/x86☆11Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- ☆37Updated last year
- ☆30Updated last year