mojtabafalleh / emudbgLinks
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum speed.
☆152Updated last week
Alternatives and similar repositories for emudbg
Users that are interested in emudbg are comparing it to the libraries listed below
Sorting:
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆54Updated 5 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆127Updated last year
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆88Updated this week
- monitors hidden syscalls called from call of duty anticheat☆85Updated 8 months ago
- A x86_64 software emulator☆149Updated last month
- Simple, fast and lightweight Header-Only C++ Assembler Library☆122Updated last month
- ☆62Updated 2 years ago
- A devirtualization engine for Themida.☆100Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- Makes IDA (most versions) to crash upon opening it.☆106Updated last year
- sigmaker is a zero-dependency IDA Pro 9.0+ cross-platform signature maker plugin with optional SIMD (e.g. AVX2/NEON/SSE2) speedups that w…☆126Updated 2 weeks ago
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆78Updated 3 weeks ago
- Rewrite and obfuscate code in compiled binaries☆256Updated 3 weeks ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- An x86-64 Code Virtualizer☆284Updated last year
- Reimplementation of Microsoft's Warbird obuscator☆143Updated last year
- WinLicense key extraction via Intel PIN☆105Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆101Updated 10 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆75Updated last week
- Windows 11 24H2 Runtime PatchGuard Bypass☆190Updated 3 weeks ago
- compile-time control flow obfuscation using mba☆195Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆83Updated last year
- x86-64 user mode emulation using Zydis☆67Updated 3 weeks ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆178Updated last month
- Using Windows' own bootloader as a shim to bypass Secure Boot☆189Updated last year
- Kernel ReClassEx☆64Updated last year
- Native opaque predicate cleaner plugin for Binary Ninja☆43Updated last month
- Port of zentool to Windows☆26Updated 7 months ago
- An x86-64 code virtualizer for VM based obfuscation☆137Updated 9 months ago