danielplohmann / empty_msvc
A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.
☆32Updated 9 months ago
Alternatives and similar repositories for empty_msvc:
Users that are interested in empty_msvc are comparing it to the libraries listed below
- IDA script for vmprotect Windows Api address decoder☆51Updated 3 years ago
- ☆22Updated 4 years ago
- ☆33Updated 3 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆35Updated 7 years ago
- ☆45Updated 4 years ago
- ☆28Updated 4 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆30Updated 7 years ago
- Random tools and things for creating+injecting complex organisms into a process on both the posix and windows platforms. Includes support…☆40Updated 2 weeks ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆76Updated 8 months ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆40Updated 5 years ago
- IDARay is an IDA Pro plugin that matches the database against multiple YARA files which themselves may contain multiple rules.☆18Updated 6 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- ☆27Updated 6 years ago
- Yet another rule generator for Yara☆28Updated 4 years ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- clone of armadillo patched for windows☆47Updated 5 months ago
- IDA plugin to explore and browse tags☆54Updated 5 years ago
- Analyses in IDA/Hex-Rays☆80Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆59Updated 7 months ago
- A set of small utilities, helpers for PIN tracers☆31Updated last year
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆77Updated 9 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Updated 2 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated last year
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- IDA plugin CMake build-script☆34Updated 5 months ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago