raffclar / pe_ep_intercept
Experimental binary patching on executables with the keystone library.
☆9Updated 5 years ago
Related projects: ⓘ
- Trying for all arch detour stuff now☆11Updated 7 years ago
- ☆25Updated this week
- ☆20Updated this week
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- A simple Windows x86-32 debugger☆10Updated 8 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Updated 7 years ago
- Demos presented on Hackerfest 2015☆13Updated 8 years ago
- Project for Injecting into Windows Processes☆13Updated 12 years ago
- PinVMShield: Dynamic Binary Instrumentation evasion/detection☆10Updated 5 years ago
- ☆11Updated this week
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 6 years ago
- ☆13Updated 6 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 12 years ago
- wow64 syscall filter☆13Updated 9 years ago
- 파일시스템 미니필터 드라이버 (교육용 코드)☆6Updated 5 years ago
- Old and probably outdated IDA plugins☆23Updated 7 years ago
- Simple VM-based scripting language☆13Updated 4 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆15Updated 7 years ago
- ☆12Updated 7 years ago
- ☆11Updated this week
- ☆8Updated 6 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- meta op for pe file☆11Updated 8 years ago
- ☆9Updated 10 years ago
- Windows Kernel Mode PCRE☆10Updated 9 years ago
- ☆10Updated this week
- Windows build files for the VMHunt Intel PIN Trace tool☆19Updated 5 years ago
- ☆10Updated this week
- ☆11Updated this week
- ☆12Updated this week