nektra / SpyStudioLinks
SpyStudio is the most advanced API monitor, that allows you to break the Operating System’s code execution, intercept and analyze any Win32 API call in real time.
☆13Updated last year
Alternatives and similar repositories for SpyStudio
Users that are interested in SpyStudio are comparing it to the libraries listed below
Sorting:
- A multiline (and ultimate) assembler (and disassembler) plugin for x64dbg and OllyDbg. A perfect tool for modifying and extending a compi…☆155Updated 9 months ago
- A length disassembler for x86-32 and x86-64 written in C. [CODE MIGRATED TO https://github.com/Nomade040/nmd]☆52Updated 5 years ago
- msvcrt.lib for linking against msvcrt.dll on all versions of Windows☆87Updated 4 years ago
- Kernel Debugging over LAN cable for Windows XP/2003 x32☆36Updated 4 years ago
- Load a 64-bit DLL into a 32-bit process.☆30Updated 3 years ago
- Fork of Scylla with additional fixes and Python bindings.☆52Updated last year
- This program allows to edit the relocation table into a Portable Executable file☆52Updated 5 years ago
- xbox_leak_may_2020☆34Updated 5 years ago
- A minimal C runtime for Windows instead of MSVCRT☆107Updated 6 years ago
- Dumps all resources from a PE file (EXE, DLL, ...)☆11Updated 6 years ago
- Demonstration of a Windows Boot Program using Window's Native API☆34Updated 6 years ago
- An improved Detours.☆84Updated last month
- Explore Kernel Objects on Windows☆237Updated 7 months ago
- Plugin to label PEB addresses.☆31Updated 8 years ago
- Internal library providing platform independent types, macros and a fallback for environments without LibC.☆112Updated 3 weeks ago
- Binary formats☆29Updated last week
- Doom running in the NT kernel☆178Updated 2 years ago
- x86 Real-Mode MS-DOS Emulator using Windows Hypervisor Platform☆141Updated last year
- ☆47Updated last year
- Cross-platform library for parsing and building PE\PE+ formats☆82Updated 3 years ago
- Improves Hex-Rays output through batch decompilation.☆68Updated 6 years ago
- Print compiler information stored in Rich Header of PE executables.☆144Updated last week
- Portable Executable launcher for Windows NT bypassing loader☆71Updated 2 months ago
- An example of Windows NT Native API application and kernel driver☆21Updated 5 years ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆34Updated 4 years ago
- Yet another PE Viewer☆141Updated 2 years ago
- ☆151Updated this week
- Small utility DLL that loads and reloads a given DLL when it's updated on disk.☆43Updated 2 years ago
- Documentation of Microsoft's Warbird obfuscation☆52Updated last year
- Pointer Sequence Reverser - enable you to see how Windows C++ application is accessing a particular data member or object.☆74Updated 7 years ago