Fix API against Themida API Redirection/Jump Trick with Cheat Engine Lua Script
☆31Jun 23, 2020Updated 5 years ago
Alternatives and similar repositories for api-deobfuscator
Users that are interested in api-deobfuscator are comparing it to the libraries listed below
Sorting:
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- IOCTL++ can be used to make DeviceIoControl requests with arbitrary inputs.☆35Oct 28, 2025Updated 4 months ago
- DTrace for Windows in userspace; Frontend to ETW☆27Oct 4, 2022Updated 3 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Branch based windows debugger☆22Jul 30, 2019Updated 6 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- XrefsExt plugin for IDA Pro(idapython,ida plugin,ida plugins)☆26Nov 13, 2024Updated last year
- Automated library compilation and PDB annotation with CMake and IDA Pro☆21Sep 20, 2018Updated 7 years ago
- ☆31Aug 26, 2021Updated 4 years ago
- VEH Redirect & VEH Debugger☆23May 18, 2020Updated 5 years ago
- ☆53Oct 16, 2021Updated 4 years ago
- FlatPMSDK☆19May 10, 2020Updated 5 years ago
- IRPT: The Art, Science, and Engineering of Windows driver fuzzing☆21Mar 26, 2021Updated 4 years ago
- Samsung CTF 2018 Problems. https://research.samsung.com/sctf2018☆20Jul 6, 2018Updated 7 years ago
- EFI bootkit for loading unsigned drivers☆37Jun 28, 2024Updated last year
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- APEX-EACBypass(usermode)☆48Feb 26, 2019Updated 7 years ago
- Diff plugin for x64dbg☆30Dec 14, 2020Updated 5 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆62Nov 18, 2020Updated 5 years ago
- A dynamic control flow graph (CFG) reconstruction plugin for valgrind.☆130Jan 21, 2026Updated last month
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆62May 31, 2021Updated 4 years ago
- ☆69Mar 3, 2022Updated 3 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- A plugin for x64dbg that can copy RVA from unknown memory pages☆34May 15, 2022Updated 3 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- generate assemblers from disassemblers, 2018 jailbreak security summit talk☆38May 11, 2020Updated 5 years ago
- Useful Scripts for helping in reverse engeenering☆181Sep 25, 2020Updated 5 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- Extremely simple but inefficient x86-64 assembly obfuscation.☆39Mar 1, 2016Updated 9 years ago
- ☆36Mar 19, 2019Updated 6 years ago
- 这是一个 fps 单机游戏逆向练习项目,使用 imgui 绘制。(This is a reverse practice project for fps single player games, drawn using imgui.)☆13Sep 5, 2023Updated 2 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Mar 18, 2019Updated 6 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Sep 19, 2022Updated 3 years ago