m417z / x64dbg-symbol-tldr
An x64dbg plugin which helps make sense of long C++ symbols
☆59Updated last year
Alternatives and similar repositories for x64dbg-symbol-tldr:
Users that are interested in x64dbg-symbol-tldr are comparing it to the libraries listed below
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆34Updated last year
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- devirtualization vmprotect☆62Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆33Updated last year
- SetWinEventHook Sample☆46Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- Report and exploit of CVE-2024-21305.☆34Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated last year
- ☆25Updated 3 months ago
- Windows kernel driver template for cmkr (with testsigning).☆30Updated last year
- Header-only C++ library for producing PE files.☆30Updated last year
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆32Updated 5 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆74Updated 6 months ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- Finding Truth in the Shadows☆88Updated 2 years ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated last year
- Example of building an application verifer DLL☆44Updated 8 months ago
- x86-64 user mode emulation using Zydis☆44Updated last month
- Windows PDB parser for kernel-mode environment.☆94Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆70Updated last year
- ☆25Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 8 months ago
- An example of how to use Microsoft Windows Warbird technology☆27Updated last year
- Signature finder (from PE-bear)☆31Updated 8 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆113Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆58Updated 6 months ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆54Updated 5 months ago