nblog / Vm2Import
fix vmprotect import function used unicorn-engine.
☆92Updated last year
Alternatives and similar repositories for Vm2Import:
Users that are interested in Vm2Import are comparing it to the libraries listed below
- VM devirtualization PoC based on AsmJit and llvm☆113Updated 3 years ago
- Noninvasive debugging plugin for X64Dbg☆102Updated 3 months ago
- ☆94Updated 7 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆72Updated 3 years ago
- VMP Mutation API Fix☆40Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- VMProtectTest☆34Updated 2 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆85Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆68Updated 2 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆131Updated 4 months ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆57Updated last year
- IDA Plugin that fills in missing indirect CALL & JMP target information☆123Updated 2 months ago
- A devirtualization engine for Themida.☆96Updated last year
- This is just a x64dbg script system support.☆46Updated 2 years ago
- VMProtect, VMP, Devirter, 3,5☆106Updated 2 years ago
- ☆123Updated 4 years ago
- ayy debuger☆89Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- Collect different versions of Crucial modules.☆130Updated 8 months ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆34Updated 4 years ago
- vmp2.x devirtualization☆68Updated 4 months ago
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆49Updated 4 years ago
- Resolve DOS MZ executable symbols at runtime☆96Updated 3 years ago
- Some garbage drivers written for getting started☆64Updated 5 years ago
- Kernel ReClassEx☆65Updated last year
- PE-Dump-Fixer☆105Updated 4 years ago
- Code virtualizer☆23Updated 8 years ago
- 可在非测试模式下符号化读取内核内存。Kernel memory can be read symbolically in non test mode。☆107Updated 2 years ago