mibho / x64dbg-vmp-trace
unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared up A LOT of misconceptions I had regarding VMP, and helped me not be as spooked as before about trying to use complex libs
☆58Updated last year
Alternatives and similar repositories for x64dbg-vmp-trace:
Users that are interested in x64dbg-vmp-trace are comparing it to the libraries listed below
- Kernel ReClassEx☆61Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- A basic 100 loc CPU emulator using the existing code of ntoskrnl.exe☆69Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- VM devirtualization PoC based on AsmJit and llvm☆113Updated 3 years ago
- Windows PDB parser for kernel-mode environment.☆95Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆137Updated 6 months ago
- A simple ida python script to find .data ptr☆51Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.☆86Updated last year
- VMP Mutation API Fix☆41Updated 3 years ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆37Updated 6 months ago
- Cheat for my own game SecureGame which uses a bootkit to hyperjack Hyper-V in order to access VBS enclave's memory☆54Updated 4 months ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆53Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆71Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆43Updated last year
- Symbolic Execution based on lifting amd64 to z3☆26Updated 10 months ago
- VMProtect, VMP, Devirter, 3,5☆106Updated 2 years ago
- Code virtualizer☆23Updated 8 years ago
- A Hyper-V Hacking Framework For Windows 10 x64 (AMD & Intel)☆59Updated last year
- ☆69Updated 2 years ago
- PE-Dump-Fixer☆105Updated 5 years ago
- POC Hook of nt!HvcallCodeVa☆51Updated last year
- ☆30Updated 2 years ago
- x86-64 user mode emulation using Zydis☆46Updated 3 months ago
- just proof of concept. hooking MmCopyMemory PG safe.☆67Updated last year
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆80Updated 4 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- 🪝 Different aproaches to detecting EPT hooks☆107Updated 3 years ago