kirschju / debugmenotLinks
Collection of simple anti-debugging tricks for Linux
☆56Updated 7 years ago
Alternatives and similar repositories for debugmenot
Users that are interested in debugmenot are comparing it to the libraries listed below
Sorting:
- Build your emulation environment as needed☆66Updated 4 years ago
- ☆38Updated 2 years ago
- PoC for a taint based attack on VMProtect☆108Updated 5 years ago
- MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls☆125Updated last year
- Small programs and scripts that do not require their own repositories☆139Updated 3 years ago
- Polymorphic VM and PoliCTF '17 reversing challenge.☆73Updated 9 months ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- ☆76Updated 3 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆85Updated 5 years ago
- PoC for a snapshot-based coverage-guided fuzzer targeting Windows kernel components☆68Updated 3 years ago
- Recover 64 bit ELF executables from memory dump☆90Updated 6 years ago
- DynamoRIO coverage visualization for cutter☆61Updated 2 years ago
- ELF packer - x86_64☆72Updated 9 years ago
- Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support☆71Updated last year
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- ELF Shared library injector using DT_NEEDED precedence infection. Acts as a permanent LD_PRELOAD☆110Updated 5 years ago
- Obfuscates dynamic symbol table☆134Updated 6 years ago
- A fast execution trace symbolizer for Windows.☆131Updated last year
- A /proc/mem IDA loader to snapshot a running process☆163Updated 3 years ago
- A Generalized Dynamic Opaque Predicate Obfuscator☆45Updated 8 years ago
- Clone of "Compiler-Agnostic Function Detection in Binaries" source code☆86Updated 3 years ago
- Devirtualize Virtual Calls☆115Updated 3 years ago
- Kernel driver to fuzz Hyper-V hypercalls☆137Updated 6 years ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆29Updated 4 years ago
- ☆180Updated 6 years ago
- Making Type Info Library (TIL) file for Apache modules☆56Updated 4 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- ☆72Updated 3 years ago