eschweiler / ProReversingLinks
Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.
☆66Updated 13 years ago
Alternatives and similar repositories for ProReversing
Users that are interested in ProReversing are comparing it to the libraries listed below
Sorting:
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- modify binary Portable Executable to hook its export functions☆67Updated 6 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Load a Windows Kernel Driver☆94Updated 8 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- ☆81Updated 8 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆54Updated 14 years ago
- PoC for detecting and dumping process hollowing code injection☆53Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 12 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Updated 9 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆80Updated 13 years ago
- *DEPRECATED* Advanced skinning plugin for IDA Pro, ported to x64dbg☆32Updated 9 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆53Updated 7 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆59Updated 6 years ago
- Simple PE packer with RtlCompressBuffer☆21Updated 10 years ago
- ☆117Updated 13 years ago
- Brand New Code Injection for Windows https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows☆18Updated 9 years ago
- Windows anti-rootkit library☆36Updated 10 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Updated 5 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 11 years ago
- x64dbg conditional branches logger [Plugin]☆72Updated 8 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- Anti-Anti-VM solution via Windows Driver☆60Updated 7 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- A command line tool to load and unload a device driver.☆46Updated 8 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆32Updated 8 years ago
- Generates a Python script to give public interface names in an ActiveX file to an IDB file.☆51Updated 4 years ago
- A DLL that performs IAT hooking☆27Updated 7 years ago
- The Minimalistic x86/x64 API Hooking Library for Windows☆32Updated 7 years ago