tandasat / DumpVTable
Generates a Python script to give public interface names in an ActiveX file to an IDB file.
☆48Updated 3 years ago
Alternatives and similar repositories for DumpVTable:
Users that are interested in DumpVTable are comparing it to the libraries listed below
- x64dbg conditional branches logger [Plugin]☆71Updated 8 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub☆77Updated 12 years ago
- Windows anti-rootkit library☆38Updated 10 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Windbg extension to find PatchGuard pages☆118Updated 10 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 8 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆45Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆34Updated 8 years ago
- just an lite AntiRootkit for interesting☆23Updated 9 years ago
- OllyHeapTrace is a plugin for OllyDbg to trace the heap operations being performed by a process.☆54Updated 13 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆75Updated 14 years ago
- Import debugging traces from WinDBG into IDA. Color the graph, fill in the value of all the operands, etc.☆25Updated 12 years ago
- A command line tool to load and unload a device driver.☆47Updated 7 years ago
- modify binary Portable Executable to hook its export functions☆62Updated 6 years ago
- libemu shim layer and win32 environment for Unicorn Engine☆71Updated 8 years ago
- Load a Windows Kernel Driver☆92Updated 7 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆50Updated 6 years ago
- ☆35Updated 9 years ago
- ☆80Updated 7 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆64Updated 12 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago
- reversed emet tool☆24Updated 12 years ago
- IDAScript to create Symbol file which can be loaded in WinDbg via AddSyntheticSymbol☆40Updated 10 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- ☆27Updated 6 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆77Updated 9 years ago
- 大表哥的Syscall-Monitor☆34Updated 5 years ago
- Wow64 syscall hook☆40Updated 7 years ago
- ☆116Updated 12 years ago