Binary rewriter for 64-bit PE files.
☆101Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for chum
Users that are interested in chum are comparing it to the libraries listed below
Sorting:
- Header-only C++ library for producing PE files.☆36Jun 17, 2023Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆32Jul 2, 2024Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆197Jul 11, 2023Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆75Aug 16, 2023Updated 2 years ago
- A portable header only library extending the C++20 STL.☆96Feb 23, 2026Updated last week
- An x86-64 Code Virtualizer☆309Sep 26, 2024Updated last year
- ☆42Jan 7, 2025Updated last year
- ☆25Aug 7, 2023Updated 2 years ago
- ☆23Jul 24, 2023Updated 2 years ago
- Interprocess communication via a covert timing channel☆26Oct 24, 2025Updated 4 months ago
- LLVM based static binary analysis framework☆302Apr 2, 2025Updated 11 months ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆28Sep 12, 2024Updated last year
- Collection of hypervisor detections☆297Sep 25, 2024Updated last year
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆409Apr 19, 2025Updated 10 months ago
- Kernel ReClassEx☆68Nov 21, 2023Updated 2 years ago
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- Using CVE-2023-21768 to manual map kernel mode driver☆197Mar 10, 2023Updated 2 years ago
- Hook syscalls from ring0 without triggering PatchGuard☆24Oct 29, 2025Updated 4 months ago
- scan system / process integrity☆350Oct 22, 2024Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆68Feb 7, 2024Updated 2 years ago
- Translate virtual addresses to physical addresses from usermode.☆104Jun 7, 2024Updated last year
- ☆34Apr 11, 2023Updated 2 years ago
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- ☆14Jul 20, 2023Updated 2 years ago
- Not mine, just saved☆14Nov 12, 2023Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆91Jul 28, 2024Updated last year
- ☆31Feb 28, 2025Updated last year
- A graphing library for Control Flow Graphs☆105Jun 19, 2025Updated 8 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Rewrite and obfuscate code in compiled binaries☆273Dec 13, 2025Updated 2 months ago
- This project migrated to https://github.com/backengineering/llvm-msvc☆83Sep 3, 2023Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆140Apr 12, 2024Updated last year
- A devirtualization engine for Themida.☆107Mar 2, 2024Updated 2 years ago
- Me fockin' pe protector☆45Nov 19, 2022Updated 3 years ago
- ☆29Dec 29, 2022Updated 3 years ago
- IDA Map File Symbol Renamer☆24Apr 1, 2025Updated 11 months ago
- Pure Go port of Hacker Disassembler Engine.☆25Feb 21, 2025Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆100Dec 7, 2024Updated last year
- Browse Page Tables on Windows (Page Table Viewer)☆234Apr 2, 2022Updated 3 years ago