mthiesen / link-patcher
Patches the Microsoft Linker so that it produces executables without the 'Rich' header
☆40Updated 2 years ago
Alternatives and similar repositories for link-patcher:
Users that are interested in link-patcher are comparing it to the libraries listed below
- ASUSTeK AsIO3 I/O driver unlock☆21Updated 4 years ago
- Template for UEFI runtime drivers written in Rust with serial logging and debugging support.☆58Updated 4 years ago
- Lifting from native architecture to VTIL. (WIP)☆75Updated 3 years ago
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆30Updated 9 months ago
- function executor based on unicorn and memflow☆89Updated last year
- A rust library that demangles / undecorates C++ symbols mangled by MSVC☆43Updated 3 months ago
- ☆53Updated 2 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆76Updated last year
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 3 years ago
- Binary Ninja plugin for automating VMProtect analysis☆60Updated 2 years ago
- Dll injector POC for new handle stealing technique☆20Updated 7 years ago
- SigMaker plugin for Binary Ninja☆9Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- dump all available information from PDBs☆129Updated last year
- ☆38Updated 2 years ago
- ☆30Updated 6 years ago
- ☆68Updated 4 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆96Updated 4 years ago
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆72Updated 7 years ago
- A code parser for C-Style header files that lets you to parse function's prototypes and data types used in their parameters.☆93Updated 3 years ago
- Minimalistic Windows Kernel Allocator.☆49Updated 8 months ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆47Updated 11 months ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- A common set of helpers used across VTIL toolchain. Moved into -->☆20Updated 5 years ago
- Capcom wrapper with safety in mind.☆79Updated 6 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆72Updated 5 years ago
- ☆35Updated 2 years ago
- Download pdbs from symbol servers and cache locally, parse symbol paths from env vars☆22Updated 2 months ago
- This master thesis project continuously collects and analyses Microsoft Windows kernel drivers using static and dynamic methods to help s…☆18Updated 6 months ago