nektra / SpyStudio
SpyStudio is the most advanced API monitor, that allows you to break the Operating System’s code execution, intercept and analyze any Win32 API call in real time.
☆11Updated last year
Alternatives and similar repositories for SpyStudio:
Users that are interested in SpyStudio are comparing it to the libraries listed below
- Dumps all resources from a PE file (EXE, DLL, ...)☆11Updated 6 years ago
- SoftICE-like debugger for Windows 2000 and XP. Archived.☆17Updated 2 years ago
- Reverse Engineering☆13Updated 7 years ago
- Fork of Scylla with additional fixes and Python bindings.☆44Updated 9 months ago
- Kernel Debugging over LAN cable for Windows XP/2003 x32☆35Updated 4 years ago
- Show all mapped memory in a process☆17Updated last year
- Delphi-Kawaii is a plugin for Ida Pro.☆21Updated last year
- An improved Detours.☆64Updated last week
- Extend dia2dump utility to generate cpp code from pdb☆33Updated last year
- Small utility DLL that loads and reloads a given DLL when it's updated on disk.☆41Updated last year
- Finds all first occurring string references near another reference☆18Updated 3 years ago
- Experimental imgui app framework for rapid prototyping.☆14Updated last year
- Plugin that automatically stores patches in the database and restores them on restart.☆29Updated last year
- Tool for generating C++ classes and json from PDB, DWARF and ELF symbols (Work in progress)☆53Updated 6 years ago
- A PE32/PE32+ parser written in MASM32☆13Updated 9 years ago
- Undocumented MSVC☆19Updated 9 months ago
- xbox_leak_may_2020☆29Updated 4 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- An example of Windows NT Native API application and kernel driver☆21Updated 5 years ago
- ☆13Updated last year
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆40Updated 7 years ago
- ☆21Updated 4 years ago
- A bunch of architectural headers for i386 and AMD64☆36Updated last year
- Lisp in kernel-mode because it was so seductive☆13Updated 4 years ago
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Updated 5 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆25Updated last year
- ☆16Updated 7 months ago
- Virtual Machine for x64 and x86 systems☆35Updated 3 weeks ago
- Load a 64-bit DLL into a 32-bit process.☆27Updated 3 years ago
- a C++ library which will automatically download a module's PDB file, then parse it for a function address☆20Updated 7 years ago