Automating x64dbg using Python
☆36Sep 20, 2015Updated 10 years ago
Alternatives and similar repositories for x64dbg-python
Users that are interested in x64dbg-python are comparing it to the libraries listed below
Sorting:
- ☆14May 1, 2021Updated 4 years ago
- WIP python3 plugin for x64dbg☆16Mar 31, 2021Updated 4 years ago
- Screen recorder for x64dbg, for recording screen while debugging.☆11Jul 27, 2016Updated 9 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆26Jan 1, 2017Updated 9 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 12 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- A Windows native DLL injection library written in C# that supports several methods of injection.☆13Dec 17, 2018Updated 7 years ago
- Detects if a Kernel mode debugger is active by reading the value of KUSER_SHARED_DATA.KdDebuggerEnabled. It is a high level and portable …☆23Sep 18, 2017Updated 8 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- ☆14Oct 5, 2019Updated 6 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- Microsoft Edge Microsoft Edge主页算法☆20Apr 15, 2019Updated 6 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- x64dbg plugin template for visual studio☆21Jan 24, 2019Updated 7 years ago
- 给windows窗口全局添加一些功能。☆21May 1, 2019Updated 6 years ago
- Tool to check if your computer is likely to be vulnerable to exploitable constant Read-Write-Execute (RWX) addresses (AVs vulnerability)☆52Dec 8, 2015Updated 10 years ago
- Automating x64dbg using Python, Snapshots:☆1,502Apr 5, 2023Updated 2 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆15Jul 6, 2014Updated 11 years ago
- Zydis Python Bindings (Work In Progress)☆32Dec 20, 2021Updated 4 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- Debugging Framework for Windows.☆1,197Jan 9, 2026Updated last month
- a demo for x86/x64's paging memory management learning, convert a virtual address from ring3 to physical address in ring0☆19Aug 26, 2017Updated 8 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- unicorn emulator for x64dbg☆34Feb 21, 2018Updated 8 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆57Jun 21, 2016Updated 9 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Map memory to user space and manipulate user memory, using capmon☆24Nov 3, 2018Updated 7 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- [SmartCom2017] An Effective Malware Detection based on Behaviour and Data Feature☆20Sep 14, 2018Updated 7 years ago