sha0coder / mwemu
x86 malware emulator
☆215Updated 2 weeks ago
Alternatives and similar repositories for mwemu:
Users that are interested in mwemu are comparing it to the libraries listed below
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆151Updated last year
- a PE Loader and Windows API tracer. Useful in malware analysis.☆138Updated 2 years ago
- Reverse engineered source code of the autochk rootkit☆201Updated 5 years ago
- HashDB API hash lookup plugin for IDA Pro☆310Updated 5 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆244Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆327Updated 2 years ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆149Updated 2 years ago
- ☆102Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆115Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆131Updated 7 months ago
- A simple ptrace-less shared library injector for x64 Linux☆251Updated 2 years ago
- Yet another variant of Process Hollowing☆384Updated last month
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆274Updated 5 months ago
- A more stealthy variant of "DLL hollowing"☆342Updated last year
- Set of antianalysis techniques found in malware☆129Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆198Updated last month
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆172Updated 3 months ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆153Updated 2 years ago
- Abusing exceptions for code execution.☆109Updated 2 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆396Updated 3 years ago
- Kernel Exploits☆250Updated 3 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆273Updated last year
- A command line Windows API tracing tool for Golang binaries.☆156Updated last year
- Call stack spoofing for Rust☆326Updated last month
- Bindings for Microsoft WinDBG TTD