mrexodia / REToolSyncLinks
Collaboration platform for reverse engineering tools.
☆41Updated 7 months ago
Alternatives and similar repositories for REToolSync
Users that are interested in REToolSync are comparing it to the libraries listed below
Sorting:
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆33Updated last year
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 2 years ago
- devirtualization vmprotect☆62Updated 2 years ago
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- ☆47Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- paste string formatted byte data block into x64dbg easy.☆41Updated 4 years ago
- ☆30Updated 3 years ago
- IDA Map File Symbol Renamer☆22Updated 4 months ago
- A Windows API hooking library !☆31Updated 2 years ago
- Fork of Scylla with additional fixes and Python bindings.☆44Updated last year
- Binary Ninja plugin for automating VMProtect analysis☆61Updated 2 years ago
- IDA-names automatically renames pseudocode windows with the current function name.☆58Updated 2 years ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- Simple x64dbg plugin to save a full memory dump☆50Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated last year
- ☆32Updated last year
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- CMake template for a basic EFI application/bootkit. This library is header-only, there is no EDK2 runtime!).☆78Updated 2 years ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆65Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆26Updated 10 months ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆32Updated last year
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆61Updated last year
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆74Updated 5 years ago
- Lightweight PDB symbol parser and resolver☆26Updated 9 months ago
- x64dbg python3 plugin☆23Updated last month
- x86-64 user mode emulation using Zydis☆48Updated 6 months ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆21Updated 11 months ago
- WinLicense key extraction via Intel PIN☆102Updated last year
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year