sha0coder / mwemuLinks
x86 malware emulator
☆249Updated last week
Alternatives and similar repositories for mwemu
Users that are interested in mwemu are comparing it to the libraries listed below
Sorting:
- Web-based tool that allows comparing symbol, type and syscall information of Microsoft Windows binaries across different versions of the …☆352Updated last week
- A DTrace on Windows Reimplementation☆366Updated 2 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆155Updated last year
- Yet another variant of Process Hollowing☆419Updated 4 months ago
- BYOVD: Loading dbk64.sys and grabbing a handle to it☆161Updated 3 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆436Updated last year
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆155Updated 3 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆224Updated last month
- Kernel Exploits☆260Updated 4 years ago
- A simple ptrace-less shared library injector for x64 Linux☆277Updated 2 years ago
- Load DLLs from memory with rust☆143Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 2 months ago
- ☆303Updated 4 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆184Updated 7 months ago
- ☆109Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆347Updated 3 years ago
- ☆149Updated 2 years ago
- Advanced driver monitoring utility.☆217Updated 3 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆257Updated 3 years ago
- A command line Windows API tracing tool for Golang binaries.☆158Updated 2 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆106Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆245Updated 3 years ago
- ☆164Updated 4 years ago
- HashDB API hash lookup plugin for IDA Pro☆345Updated last month
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆233Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆309Updated last year
- Set of antianalysis techniques found in malware☆131Updated 2 years ago