mrexodia / REToolSyncLinks
Collaboration platform for reverse engineering tools.
☆42Updated 8 months ago
Alternatives and similar repositories for REToolSync
Users that are interested in REToolSync are comparing it to the libraries listed below
Sorting:
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆33Updated last year
- devirtualization vmprotect☆62Updated 2 years ago
- Plugin for x64dbg to disable parallel loading of dependencies☆19Updated 3 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year
- Windows kernel driver template for cmkr and llvm-msvc.☆35Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- A Windows API hooking library !☆31Updated 3 years ago
- IDA Map File Symbol Renamer☆22Updated 5 months ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Updated last year
- ☆33Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- Binary Ninja plugin for automating VMProtect analysis☆62Updated 2 years ago
- ☆46Updated 3 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 4 years ago
- A driver to implement IOCTL hooking☆24Updated 3 years ago
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- IDA-names automatically renames pseudocode windows with the current function name.☆58Updated 2 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year
- ☆30Updated 3 years ago
- x86-64 user mode emulation using Zydis☆64Updated 2 weeks ago
- api-tracer is a tiny (useless) tracer☆15Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- ☆23Updated last month
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- Simple x64dbg plugin to save a full memory dump☆50Updated 2 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 5 years ago
- WinLicense key extraction via Intel PIN☆101Updated last year