bl4ckswan / anti-disassemblyLinks
☆21Updated 8 years ago
Alternatives and similar repositories for anti-disassembly
Users that are interested in anti-disassembly are comparing it to the libraries listed below
Sorting:
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- ☆36Updated 3 years ago
- 大表哥的Syscall-Monitor☆34Updated 6 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- VMProtect analysis script☆54Updated 5 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆34Updated last year
- VEH Redirect & VEH Debugger☆23Updated 5 years ago
- Wow64 Heaven's Gate Hook☆28Updated 4 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- a code virtualizer based on angr☆30Updated 2 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆65Updated 2 years ago
- Rootkit & Anti-rootkit☆41Updated last year
- Simple x64dbg plugin to save a full memory dump☆50Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 7 years ago
- unicorn emulator for x64dbg☆34Updated 7 years ago
- vm -- code interpreter☆25Updated 6 years ago
- vmp2.x devirtualization☆83Updated 11 months ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆78Updated 14 years ago
- ☆21Updated 7 years ago
- ☆37Updated 9 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 4 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- win32/x64 obfuscate framework☆33Updated 6 years ago
- intel vt-x hypervisor ept☆24Updated 5 years ago
- ☆19Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago