jbremer / vb6tracer
Runtime tracer for the vb6 virtual machine
☆55Updated 7 years ago
Alternatives and similar repositories for vb6tracer:
Users that are interested in vb6tracer are comparing it to the libraries listed below
- analysis of visual basic code☆41Updated 7 years ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆16Updated 8 years ago
- Unicorn PE function runner☆56Updated 7 years ago
- Tools for static and dynamic analysis of ActionScript3 SWF files.☆46Updated 6 years ago
- Automated library compilation and PDB annotation with CMake and IDA Pro☆20Updated 6 years ago
- Identifying Virtual Table Functions using VTBL IDA Pro Plugin + Deviare Hooking Engine☆94Updated 12 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆71Updated 8 years ago
- ☆30Updated 9 years ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆35Updated 7 years ago
- IDA plugin to explore and browse tags☆54Updated 5 years ago
- VMI-Unpack - A Virtual Machine Introspection (VMI) based generic unpacker.☆55Updated 5 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆73Updated 5 years ago
- ☆22Updated 4 years ago
- Hansel - a simple but flexible search for IDA☆26Updated 5 years ago
- Random tools and things for creating+injecting complex organisms into a process on both the posix and windows platforms. Includes support…☆40Updated last month
- A python script that can be used to scan data within in an IDB using Yara.☆22Updated 6 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated 10 months ago
- ☆14Updated 7 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- IDA Plugin which decodes Windows Device I/O control code into DeviceType, FunctionCode, AccessType and MethodType.☆108Updated last year
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- An Integrity-Check Monitoring Pintool☆56Updated 4 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 8 years ago
- Bootkits Revisited☆41Updated 10 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆31Updated 7 years ago
- ☆70Updated 11 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated last year