pwnslinger / SMCLinks
Self-modifying Code de-obfuscation
☆16Updated 8 years ago
Alternatives and similar repositories for SMC
Users that are interested in SMC are comparing it to the libraries listed below
Sorting:
- 一些研究☆14Updated 5 years ago
- vm -- code interpreter☆25Updated 6 years ago
- ☆19Updated 6 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35Updated 5 years ago
- XPN's RpcEnum but based on IDA instead of Ghidra☆21Updated 6 years ago
- IDA PRO FLIRT signature files MSVC2017的sig文件☆14Updated 6 years ago
- IDA 7.0 meets watch view!☆43Updated 4 years ago
- Using Microsoft Visual Studio 2019 Building A LLVM Out-Source-Tree Pass☆16Updated 5 years ago
- ☆20Updated 7 years ago
- hooking KiUserApcDispatcher☆25Updated 8 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 6 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Updated 7 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- 代码虚拟化与自动化分析☆64Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆14Updated 6 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 6 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Updated 6 years ago
- ☆21Updated 8 years ago
- ☆21Updated 7 years ago
- Using Undocumented NTDLL Functions to Read/Write/Delete File☆18Updated 4 years ago
- AllMemPro☆46Updated 7 years ago
- Create and use macros in IDA's CLIs☆65Updated last week
- ☆18Updated 7 years ago
- Windbg extension that allows you analyze Control Flow Guard map☆36Updated 4 years ago
- ☆14Updated 7 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆45Updated 8 years ago
- prebuild angr wheels for Windows on x86_64☆15Updated 7 years ago
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Updated 11 months ago