milcert / ExpoMonLinks
Exports monitoring plugin for x64dbg
☆22Updated 2 years ago
Alternatives and similar repositories for ExpoMon
Users that are interested in ExpoMon are comparing it to the libraries listed below
Sorting:
- FastSymApi - A Fast API PDB Symbol Cache Server that efficiently caches and compresses PDBs on disk for quick and repeated retrieval.☆19Updated 8 months ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- .lib file for linking against the NT CRT☆19Updated 3 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 2 years ago
- ☆29Updated 3 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆34Updated last year
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 6 years ago
- ☆21Updated 4 months ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- Windows Minidump loader for Ghidra☆29Updated 2 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- ☆15Updated 2 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Updated last year
- Collaboration platform for reverse engineering tools.☆40Updated 6 months ago
- An example of how to use Microsoft Windows Warbird technology☆28Updated 2 years ago
- Test data for x86 instructions☆13Updated 4 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 10 months ago
- Code Integrity Violation Spotter☆16Updated last year
- Small project to generate fake DLLs based on an executable's import table☆23Updated 5 years ago
- vmware-backdoor☆33Updated 3 years ago
- Personal curation of Clang/LLVM patches.☆13Updated 4 years ago
- Symbolic Execution based on lifting amd64 to z3☆27Updated 11 months ago
- EDR PoC WIP LLC☆11Updated last year
- ☆31Updated 3 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- Panda - is a set of utilities used to research how PsExec encrypts its traffic.☆12Updated 4 years ago
- ☆16Updated 2 years ago