mrexodia / REToolSyncLinks
Collaboration platform for reverse engineering tools.
☆44Updated last year
Alternatives and similar repositories for REToolSync
Users that are interested in REToolSync are comparing it to the libraries listed below
Sorting:
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- devirtualization vmprotect☆64Updated 2 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆37Updated last year
- A Windows API hooking library !☆31Updated 3 years ago
- A driver to implement IOCTL hooking☆27Updated 3 years ago
- ☆34Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated 2 years ago
- Binary Ninja plugin for automating VMProtect analysis☆64Updated 3 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Updated last year
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- x64dbg python3 plugin☆30Updated last week
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- ☆46Updated 4 years ago
- [deprecated] Simple x64dbg plugin to save a full memory dump☆50Updated 3 years ago
- IDA-names automatically renames pseudocode windows with the current function name.☆60Updated 3 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆58Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆94Updated 3 years ago
- paste string formatted byte data block into x64dbg easy.☆41Updated 5 years ago
- ☆30Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆27Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆89Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 4 years ago
- x86-64 user mode emulation using Zydis☆70Updated 4 months ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Updated last year
- Exports monitoring plugin for x64dbg☆22Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 6 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year