nblog / Vm2ImportLinks
fix vmprotect import function used unicorn-engine.
☆97Updated 2 years ago
Alternatives and similar repositories for Vm2Import
Users that are interested in Vm2Import are comparing it to the libraries listed below
Sorting:
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- VMP Mutation API Fix☆42Updated 3 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆74Updated 3 years ago
- VMProtectTest☆40Updated 2 years ago
- ☆98Updated 8 years ago
- VM devirtualization PoC based on AsmJit and llvm☆114Updated 4 years ago
- Noninvasive debugging plugin for X64Dbg☆108Updated 11 months ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- vmp2.x devirtualization☆83Updated 11 months ago
- x64 syscall caller in C++.☆92Updated 7 years ago
- ☆125Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
- ☆36Updated 3 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆103Updated 4 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated 2 years ago
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆115Updated 4 years ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆138Updated 9 months ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆36Updated 5 years ago
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- Global DLL injector☆68Updated 4 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- Code virtualizer☆25Updated 9 years ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆95Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago
- too busy for that all, furikuri is framework for code protection☆161Updated 5 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆149Updated last year
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- disable most common windowsx64 systems patchguard☆86Updated 6 years ago