nblog / Vm2ImportLinks
fix vmprotect import function used unicorn-engine.
☆96Updated 2 years ago
Alternatives and similar repositories for Vm2Import
Users that are interested in Vm2Import are comparing it to the libraries listed below
Sorting:
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆75Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Updated 3 years ago
- ☆98Updated 7 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- x64 syscall caller in C++.☆91Updated 7 years ago
- Noninvasive debugging plugin for X64Dbg☆106Updated 9 months ago
- VMProtectTest☆38Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆88Updated last year
- ☆125Updated 5 years ago
- VM devirtualization PoC based on AsmJit and llvm☆117Updated 4 years ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- vmp2.x devirtualization☆78Updated 10 months ago
- PE-Dump-Fixer☆111Updated 5 years ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆131Updated 8 months ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆103Updated 4 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆91Updated 2 years ago
- Global DLL injector☆69Updated 4 years ago
- ☆36Updated 3 years ago
- VMProtect, VMP, Devirter, 3,5☆108Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- 🪝 Various EPT hook detection approaches☆124Updated last month
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆35Updated 5 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 3 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated 2 years ago
- the basic version of the ring0 physical memory read/write tool☆89Updated 6 years ago
- ayy debuger☆89Updated last year
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆53Updated 6 years ago