mojtabafalleh / emudbgLinks
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum speed.
β171Updated last month
Alternatives and similar repositories for emudbg
Users that are interested in emudbg are comparing it to the libraries listed below
Sorting:
- VMProtect2 Deobfuscation Toolingβ75Updated last month
- π¬ IDA plugin to find patched memoryβ76Updated last week
- β62Updated 2 years ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.β136Updated last year
- π¨ Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.β117Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack stringsβ114Updated 3 months ago
- A devirtualization engine for Themida.β105Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uβ¦β64Updated last year
- A x86_64 software emulatorβ160Updated 4 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Libraryβ128Updated 4 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy β¦β54Updated 8 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).β160Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypassβ237Updated 2 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 βghost instructions.ββ110Updated 2 months ago
- WinLicense key extraction via Intel PINβ107Updated last year
- monitors hidden syscalls called from call of duty anticheatβ88Updated 11 months ago
- sigmaker is a zero-dependency IDA Pro 9.0+ cross-platform signature maker plugin with optional SIMD (e.g. AVX2/NEON/SSE2) speedups that wβ¦β147Updated last month
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.β92Updated 2 months ago
- Native opaque predicate cleaner plugin for Binary Ninjaβ44Updated this week
- Reimplementation of Microsoft's Warbird obuscatorβ153Updated last year
- Kernel ReClassExβ65Updated 2 years ago
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.β213Updated 2 weeks ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineersβ100Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)β80Updated 2 months ago
- An x86-64 Code Virtualizerβ295Updated last year
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.β89Updated last year
- Rewrite and obfuscate code in compiled binariesβ273Updated 3 weeks ago
- compile-time control flow obfuscation using mbaβ199Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.β154Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscatorsβ70Updated 3 years ago