raffclar / pe_ep_intercept
Experimental binary patching on executables with the keystone library.
☆9Updated 6 years ago
Alternatives and similar repositories for pe_ep_intercept:
Users that are interested in pe_ep_intercept are comparing it to the libraries listed below
- Trying for all arch detour stuff now☆11Updated 8 years ago
- IDA2PAT_Reloaded for windows and mac osx☆13Updated 7 years ago
- ARMv7 detour function for hooking junk (no thumb support, unaligned accesses are not atomic)☆16Updated 8 years ago
- A simple Windows x86-32 debugger☆10Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Updated 6 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- ☆12Updated 8 years ago
- IDA WhatAPIs PlugIn☆7Updated 9 years ago
- ☆14Updated 9 years ago
- Project for Injecting into Windows Processes☆13Updated 13 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- This repository is a clne of the new cuckoo monitor where I added some stuff to get the calling address for every hooked API☆8Updated 8 years ago
- meta op for pe file