vlinx-io / NativeImageAnalyzerLinks
GraalVM NativeImage Decompilation/Reverse Tool
☆25Updated last year
Alternatives and similar repositories for NativeImageAnalyzer
Users that are interested in NativeImageAnalyzer are comparing it to the libraries listed below
Sorting:
- A ready-made template for a project based on libpeconv.☆50Updated 2 weeks ago
- Portable & Custmizable Windows Defender☆12Updated 4 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆32Updated 2 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆150Updated 5 years ago
- My try to implement a virtual CPU in C☆19Updated last year
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Windows Kernel Programming Experiments☆82Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆61Updated 2 years ago
- ☆31Updated 3 years ago
- A hooking library with a MinHook-like API and a Detours-like implementation, with support for the x86, x64, and ARM64 platforms☆29Updated 3 months ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Vulnerability analysis and proof of concepts☆37Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆73Updated last year
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 4 years ago
- Detours implementation (x64/x86) which used only ntdll import☆89Updated last month
- 参考taviso的代码逆向一下mpengine.dll☆20Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆38Updated 3 years ago
- Elevate arbitrary MSR writes to kernel execution.☆38Updated 2 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 6 years ago
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆46Updated 3 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆61Updated 2 years ago
- A small C library for the XChaCha20 stream cipher☆39Updated 2 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Updated 3 years ago
- Load a statically-linked ELF binary(x86 architecture) without the execve syscall.☆45Updated 5 years ago