mojtabafalleh / emudbgLinks
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum speed.
☆23Updated this week
Alternatives and similar repositories for emudbg
Users that are interested in emudbg are comparing it to the libraries listed below
Sorting:
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆124Updated last year
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆74Updated last month
- Simple, fast and lightweight Header-Only C++ Assembler Library☆89Updated last month
- A x86_64 software emulator☆135Updated last week
- monitors hidden syscalls called from call of duty anticheat☆82Updated 6 months ago
- A devirtualization engine for Themida.☆100Updated last year
- Windows kernel debugger for Linux hosts running Windows under KVM/QEMU☆91Updated 2 months ago
- IDA Type Info Libraries for RE☆31Updated 6 months ago
- Header-only C++ library for producing PE files.☆34Updated 2 years ago
- An x86-64 code virtualizer for VM based obfuscation☆126Updated 7 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆51Updated 2 months ago
- Load dll with undocumented functions and debug symbols☆47Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆61Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆35Updated this week
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆56Updated 9 months ago
- Binary rewriter for 64-bit PE files.☆83Updated last year
- llvm powered deobfuscation of a vm-based protection☆39Updated 3 months ago
- Kernel ReClassEx☆63Updated last year
- Port of zentool to Windows☆24Updated 4 months ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- Research-focused hypervisor offering advanced tools for debugging, virtual machine introspection, and automation.☆37Updated last month
- Generate a PDB file given the old PDB file and an address mapping☆49Updated this week
- dynamic binary instrumentation, analysis, and patching framework☆73Updated last week
- Me fockin' pe protector☆45Updated 2 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆113Updated last year
- memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V☆258Updated 2 weeks ago
- compile-time control flow obfuscation using mba☆189Updated 2 years ago
- Collection of Cheat dumps for Research and Detection.☆16Updated last week
- WinLicense key extraction via Intel PIN☆102Updated last year