charlesnathansmith / whatlicenseLinks
WinLicense key extraction via Intel PIN
☆107Updated last year
Alternatives and similar repositories for whatlicense
Users that are interested in whatlicense are comparing it to the libraries listed below
Sorting:
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆88Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆63Updated last year
- ☆34Updated last year
- A x86_64 software emulator☆158Updated 3 months ago
- devirtualization vmprotect☆64Updated 2 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆35Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- A devirtualization engine for Themida.☆103Updated last year
- VM devirtualization PoC based on AsmJit and llvm☆119Updated 4 years ago
- VMProtect2 Deobfuscation Tooling☆73Updated last month
- ☆63Updated 2 years ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆111Updated 2 months ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆91Updated last month
- x86-64 user mode emulation using Zydis☆72Updated 3 months ago
- Fork of Scylla with additional fixes and Python bindings.☆53Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆151Updated last year
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Updated last year
- Symbolic Execution based on lifting amd64 to z3☆29Updated last year
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆116Updated 2 years ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆158Updated last year
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆98Updated 2 years ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- Kernel ReClassEx☆65Updated 2 years ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆140Updated 11 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆109Updated last month
- IDA-names automatically renames pseudocode windows with the current function name.☆60Updated 2 years ago
- Titan is a VMProtect devirtualizer☆57Updated 2 years ago