momo5502 / patch-finderLinks
π¬ IDA plugin to find patched memory
β74Updated this week
Alternatives and similar repositories for patch-finder
Users that are interested in patch-finder are comparing it to the libraries listed below
Sorting:
- monitors hidden syscalls called from call of duty anticheatβ87Updated 10 months ago
- VMProtect2 Deobfuscation Toolingβ71Updated 3 weeks ago
- Simple, fast and lightweight Header-Only C++ Assembler Libraryβ128Updated 3 months ago
- C++ macro for x64 programs that breaks ida hex-rays decompiler tool.β131Updated last year
- A devirtualization engine for Themida.β101Updated last year
- A x86_64 software emulatorβ156Updated 3 months ago
- β62Updated 2 years ago
- Kernel ReClassExβ65Updated 2 years ago
- Header-only C++ library for producing PE files.β35Updated 2 years ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy β¦β54Updated 7 months ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)β46Updated 2 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.β66Updated 2 years ago
- Yet another IDA Pro/Home plugin for deobfuscating stack stringsβ108Updated 2 months ago
- β87Updated last month
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.β90Updated last month
- A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instructβ¦β165Updated 3 weeks ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uβ¦β63Updated last year
- x86-64 user mode emulation using Zydisβ71Updated 2 months ago
- Binary rewriter for 64-bit PE files.β88Updated last year
- Cross-Platform Framework for High-Speed Memory Pattern Scanning with Multithreading, SIMD Support, and Alternative STL ETL Integrationβ44Updated last month
- Load dll with undocumented functions and debug symbolsβ47Updated last year
- Kernel Level NMI Callback Blockerβ138Updated 2 months ago
- π¨ Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.β117Updated last year
- Find out how to bypass HVCI (or not). My own research on Microsoft Warbird (specifically in clipsp.sys)β77Updated last month
- Windows driver mapper via the UEFIβ50Updated 4 months ago
- Integration of Microsoft Warbird with the MSVC compilerβ115Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processesβ52Updated last year
- SMM driver/rootkit for platform memory access with R3 <-> R0 <-> R-2 communication.β109Updated last year
- Generate a PDB file given the old PDB file and an address mappingβ50Updated 4 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEPβ59Updated last year