mrexodia / regstep
Simple x64dbg plugin to show registers on every step.
☆16Updated 5 years ago
Alternatives and similar repositories for regstep:
Users that are interested in regstep are comparing it to the libraries listed below
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Diff plugin for x64dbg☆31Updated 4 years ago
- A demo AsmJit-based VTIL amd64 compiler.☆12Updated 4 years ago
- VEH Redirect & VEH Debugger☆23Updated 4 years ago
- x64dbg Malware Plugin. Detect malicious materials☆15Updated 4 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆15Updated last year
- Proof of concept headless GUI DLL☆12Updated 3 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- Plugin for x64dbg to break on unresolved APIs.☆12Updated 7 years ago
- A small header file mapping status codes passed to KiExceptionDispatch before KiPreprocessFault to individual CPU faults.☆13Updated 6 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆22Updated 4 years ago
- Remote memory library in C++17.☆31Updated 6 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- Personal curation of Clang/LLVM patches.☆13Updated 4 years ago
- NoREpls - Application designed for the purposes of reverse engineering.☆11Updated 6 years ago
- Windows Broken Stack Guard Page☆11Updated 2 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- ☆14Updated 12 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13Updated 10 years ago
- ☆19Updated 5 years ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- Collection of IDA Pro/Hex-Rays configs, scripts, and plugins☆23Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- PE Infector/Cryptor source code☆15Updated 8 years ago
- ☆33Updated 3 years ago
- WIP python3 plugin for x64dbg☆14Updated 4 years ago
- WhoCalls can query a directory of files, find the binaries, and search for a user specified Win API import. It and works with both 32-bit…☆17Updated 2 years ago