push0ebp / xMalHunterLinks
x64dbg Malware Plugin. Detect malicious materials
☆15Updated 5 years ago
Alternatives and similar repositories for xMalHunter
Users that are interested in xMalHunter are comparing it to the libraries listed below
Sorting:
- VEH Redirect & VEH Debugger☆23Updated 5 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 3 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆32Updated 8 years ago
- ☆19Updated 6 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 5 years ago
- An API Monitor based on Instrumentation☆43Updated 7 years ago
- Currently proof-of-concept☆17Updated 3 years ago
- ☆24Updated 4 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 4 years ago
- ☆17Updated 5 years ago
- Code Integrity Violation Spotter☆17Updated last year
- ☆27Updated 9 years ago
- ☆28Updated 5 years ago
- ☆20Updated 8 years ago
- ☆15Updated 2 years ago
- hooking KiUserApcDispatcher☆25Updated 8 years ago
- Demonstrate the new FileDispositionInfoEx behavior☆14Updated 7 years ago
- A debugger backend for IDA Pro built on top of of Intel’s PIN framework☆33Updated last year
- Triton based symbolic emulator☆16Updated 2 years ago
- ☆34Updated 4 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆33Updated 7 years ago
- ☆47Updated 5 years ago
- ☆20Updated 6 years ago
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Updated 8 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- Simple DLL and client app that work together to hook all the functions in WinHvPlatform.dll in order to provide logging and introspection…☆18Updated 3 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- Exploiting HEVD's WriteWhatWhereIoctlDispatch for LPE on Windows 10 TH2 through RS3 using GDI objects.☆24Updated 7 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago