diversenok / DiaSymbolViewLinks
PDB file inspection tool
☆126Updated 2 months ago
Alternatives and similar repositories for DiaSymbolView
Users that are interested in DiaSymbolView are comparing it to the libraries listed below
Sorting:
- A Python script to download PDB files associated with a Portable Executable (PE)☆128Updated 11 months ago
- A high-fidelity x86_64 polymorphic mutation engine focused on instruction-level fragmentation and context preservation.☆103Updated 2 weeks ago
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)☆86Updated 3 months ago
- Generate a PDB file given the old PDB file and an address mapping☆51Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆273Updated last month
- Code samples that serve as references for Windows API functions☆77Updated last year
- Proof-of-concept game using VBS enclaves to protect itself from cheating☆49Updated last year
- ☆72Updated 2 years ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆138Updated 3 months ago
- Integration of Microsoft Warbird with the MSVC compiler☆116Updated 2 years ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆132Updated 5 months ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆86Updated 5 years ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Updated 10 months ago
- Elevate arbitrary MSR writes to kernel execution.☆43Updated 2 years ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆93Updated 3 months ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Finding Truth in the Shadows☆120Updated 3 years ago
- monitors hidden syscalls called from call of duty anticheat☆89Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆161Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆79Updated 3 years ago
- Harness to issue Virtual Secure Mode (VSM) "secure calls" from VTL 0 to VTL 1☆70Updated 4 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆260Updated 3 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 4 years ago
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆117Updated this week
- ☆93Updated last year
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- Windows kernel PDB data parsed into YAML☆42Updated 3 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Updated 10 months ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25Updated 8 months ago