cra0kalo / LiveDumpLinks
A simple memory dumper
☆12Updated 5 years ago
Alternatives and similar repositories for LiveDump
Users that are interested in LiveDump are comparing it to the libraries listed below
Sorting:
- ☆30Updated 4 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Updated 5 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- ☆46Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- Improves Hex-Rays output through batch decompilation.☆68Updated 7 years ago
- Code virtualizer☆26Updated 9 years ago
- a C++ library which will automatically download a module's PDB file, then parse it for a function address☆21Updated 8 years ago
- ☆24Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆23Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆45Updated 2 months ago
- IDA Map File Symbol Renamer☆22Updated 9 months ago
- NT reversal☆25Updated 7 years ago
- Global DLL injector☆70Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆86Updated 10 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 4 years ago
- Lifting from native architecture to VTIL. (WIP)☆77Updated 3 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆36Updated last year
- battleye shellcode☆18Updated 5 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Updated 2 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 5 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- ☆25Updated 7 years ago
- reveal and detect of common hooks under win32☆13Updated 5 years ago
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆34Updated 5 years ago