vlinx-io / NativeImageAnalyzerLinks
GraalVM NativeImage Decompilation/Reverse Tool
☆25Updated last year
Alternatives and similar repositories for NativeImageAnalyzer
Users that are interested in NativeImageAnalyzer are comparing it to the libraries listed below
Sorting:
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- ☆62Updated 4 months ago
- ☆32Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Portable & Custmizable Windows Defender☆12Updated 4 years ago
- C++ Program used to dump Themida and VMProtect.☆31Updated last year
- ☆12Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆41Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆33Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- A hooking library with a MinHook-like API and a Detours-like implementation, with support for the x86, x64, and ARM64 platforms☆29Updated this week
- A ready-made template for a project based on libpeconv.☆51Updated last month
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆35Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆33Updated 8 years ago
- ☆56Updated 11 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆73Updated last year
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Updated last year
- Triton based symbolic emulator☆16Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- Wow64 Heaven's Gate Hook☆29Updated 4 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 2 years ago
- Simple tool to dump/hide services in services.exe process.☆14Updated 3 years ago
- LLVM based obfuscation engine☆108Updated 5 months ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆11Updated 10 months ago
- An attempt at reversing WindowsDefender☆20Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆63Updated 2 years ago