saweol / vwaadLinks
IDA script for vmprotect Windows Api address decoder
☆51Updated 4 years ago
Alternatives and similar repositories for vwaad
Users that are interested in vwaad are comparing it to the libraries listed below
Sorting:
- ☆27Updated 7 years ago
- reverse engineering extension plugin for windbg☆116Updated 5 years ago
- Plugins for IDA Pro and Hex-Rays☆42Updated 7 years ago
- IDA plugin to explore and browse tags☆56Updated 5 years ago
- ☆72Updated 3 years ago
- Collects extended function properties from IDA Pro databases☆93Updated 4 years ago
- Analyses in IDA/Hex-Rays☆83Updated 2 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆25Updated 3 years ago
- ☆34Updated 3 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆35Updated 11 months ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated 11 months ago
- IDA Pro plugin that changes color of call instructions and works with all architectures☆58Updated 6 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆83Updated 5 years ago
- Static unpacker for FinSpy VM☆101Updated 3 years ago
- ☆24Updated 9 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆51Updated 6 years ago
- ☆28Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Updated 4 years ago
- A collection of empty MSVC projects, compiled using various versions and configurations of Visual Studio.☆32Updated last year
- ☆46Updated 4 years ago
- This IDAPython script tags subroutines according to their use of imported functions☆73Updated 4 years ago
- Create and use macros in IDA's CLIs☆64Updated 2 years ago
- dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>☆66Updated 8 years ago
- PoC for a taint based attack on VMProtect☆108Updated 5 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆41Updated 5 years ago
- Bypass for the hardening against usage of tagWnd as a kernel read/write primitive☆29Updated 8 years ago
- This is a simple driver with x64 inline assembly☆56Updated 4 years ago
- IDA 7.0 meets watch view!☆42Updated 3 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆67Updated 5 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago