vic4key / CFF_VExtensionLinks
VExtension for NTCore Explorer Suite aka CFF Explorer
☆41Updated 3 years ago
Alternatives and similar repositories for CFF_VExtension
Users that are interested in CFF_VExtension are comparing it to the libraries listed below
Sorting:
- X86/X64 Hardware Breakpoint Manager☆41Updated 4 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- This is just a x64dbg script system support.☆47Updated 3 years ago
- Debug Print viewer (user and kernel)☆66Updated last year
- direct systemcalls with a modern c++20 interface.☆43Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 2 years ago
- Cpp Hooking - Set up function hooking easily and writing less code (P.S You can also find the python version @ https://github.com/vic4key…☆30Updated last year
- Black Signature Driver☆24Updated last year
- Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and …☆70Updated 10 months ago
- ☆22Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆96Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆36Updated 2 years ago
- Native API header files for the Process Hacker project (nightly).☆26Updated 2 weeks ago
- VMP Mutation API Fix☆41Updated 3 years ago
- ☆27Updated last year
- A debugger library using VEH.☆61Updated 10 months ago
- Windows Research Kernel VS2022 Solution☆33Updated 10 months ago
- ☆48Updated 6 years ago
- The updated PE file manipulation library from RetDec project.☆20Updated last year
- A class to gather information about a process, its threads and modules.☆24Updated 5 years ago
- A Windows API hooking library !☆31Updated 2 years ago
- c++ implementation of windows heavens gate☆72Updated 4 years ago
- ☆30Updated 3 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆29Updated 4 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated last year
- A bunch of architectural headers for i386 and AMD64☆40Updated last year