mojtabafalleh / emudbgLinks
A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructions, and skips Windows API calls via debugger for maximum speed.
☆155Updated 3 weeks ago
Alternatives and similar repositories for emudbg
Users that are interested in emudbg are comparing it to the libraries listed below
Sorting:
- VMProtect2 Deobfuscation Tooling☆52Updated last week
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.☆128Updated last year
- A x86_64 software emulator☆154Updated 2 months ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆54Updated 5 months ago
- A devirtualization engine for Themida.☆101Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆99Updated 3 weeks ago
- sigmaker is a zero-dependency IDA Pro 9.0+ cross-platform signature maker plugin with optional SIMD (e.g. AVX2/NEON/SSE2) speedups that w…☆133Updated last month
- ☆62Updated 2 years ago
- monitors hidden syscalls called from call of duty anticheat☆85Updated 9 months ago
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆117Updated last year
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 2 months ago
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆156Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- IDA plugin to find patched memory☆60Updated last week
- Runtime Hyper-V Hijacking with DDMA☆64Updated 2 months ago
- Hooking Windows' exception dispatcher to protect process's PML4☆204Updated 9 months ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆190Updated last year
- An AI-powered assistant for IDA 9.0+ to accelerate reverse engineering of C++ games.☆188Updated last week
- Rewrite and obfuscate code in compiled binaries☆261Updated last week
- A Windows executable (PE) packer (x64) with LZMA compression and with full TLS (Thread Local Storage) support☆86Updated 2 weeks ago
- compile-time control flow obfuscation using mba☆196Updated 2 years ago
- WinLicense key extraction via Intel PIN☆106Updated last year
- Kernel ReClassEx☆64Updated last year
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆101Updated 10 months ago
- Code proving a 25-year blind spot in all disassemblers. PoC for Intel x64/x86 “ghost instructions.”☆101Updated 3 weeks ago
- An x86-64 Code Virtualizer☆286Updated last year
- Windows 11 24H2-25H2 Runtime PatchGuard Bypass☆203Updated last week
- Ghetto user mode emulation of Windows kernel drivers.☆149Updated last year
- x86-64 user mode emulation using Zydis☆69Updated last month
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆83Updated last year