raffclar / pe_ep_interceptLinks
Experimental binary patching on executables with the keystone library.
☆9Updated 6 years ago
Alternatives and similar repositories for pe_ep_intercept
Users that are interested in pe_ep_intercept are comparing it to the libraries listed below
Sorting:
- Trying for all arch detour stuff now☆11Updated 8 years ago
- ☆13Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- A simple Windows x86-32 debugger☆10Updated 9 years ago
- 64 pack☆7Updated 9 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated 6 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 6 years ago
- ☆13Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- PinVMShield: Dynamic Binary Instrumentation evasion/detection☆11Updated 6 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆15Updated 8 years ago
- collection of scripts and stuff☆12Updated 8 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Updated 8 years ago
- ☆12Updated 8 years ago
- ☆10Updated 7 years ago
- ☆9Updated 7 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Updated 6 years ago
- ☆10Updated 11 years ago
- Kernel-mode file scanner☆18Updated 6 years ago
- Dark Cloud Virus☆7Updated 7 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Updated 9 years ago
- Simple VM-based scripting language☆13Updated 5 years ago
- PoC || GTFO Article Materials on Kernel Double Free☆12Updated 8 years ago
- reverse win7 32bit hotpatch implement☆9Updated 11 years ago
- wow64 syscall filter☆13Updated 10 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 9 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- ☆13Updated 7 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago