milcert / ExpoMonLinks
Exports monitoring plugin for x64dbg
☆22Updated 2 years ago
Alternatives and similar repositories for ExpoMon
Users that are interested in ExpoMon are comparing it to the libraries listed below
Sorting:
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆18Updated 3 months ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- ☆15Updated 2 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- ☆31Updated 3 years ago
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆32Updated 3 years ago
- Application Verifier Dynamic Fault Injection☆39Updated last month
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 3 years ago
- Windows Minidump loader for Ghidra☆29Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year
- ☆16Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆30Updated 4 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆34Updated last year
- A way to detect DBI frameworks, Debuggers and VMs.☆21Updated 4 years ago
- Test data for x86 instructions☆13Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- Binary DisASseMbler☆24Updated 3 years ago
- ☆22Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆65Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆31Updated 8 years ago
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆21Updated 11 months ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Updated 3 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆22Updated last year
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆23Updated last year