x64dbg / asmjit_xedparseLinks
XEDParse emulator based on asmjit/asmtk.
☆22Updated last year
Alternatives and similar repositories for asmjit_xedparse
Users that are interested in asmjit_xedparse are comparing it to the libraries listed below
Sorting:
- XDK is a fully featured C++ wrapper library for Windows kernel development☆20Updated 9 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆22Updated 4 months ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- UI application that can compare PE images in memory or in raw PE file☆17Updated 11 years ago
- Simple program for static hooking dynamic libraries in executable application☆22Updated 11 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆14Updated 7 years ago
- ☆32Updated 6 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆17Updated 10 years ago
- Some eternal WIP stuff :)☆17Updated 3 months ago
- by others☆38Updated 7 years ago
- ☆11Updated 7 years ago
- ☆14Updated 11 months ago
- gamedll☆10Updated 8 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆10Updated 5 years ago
- windows LPC library☆42Updated 12 years ago
- Hidden module/dll detector for windows apps☆15Updated 8 years ago
- A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any proce…☆21Updated 7 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- ☆14Updated 6 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- Automatically exported from code.google.com/p/guardlite☆11Updated 9 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- ☆13Updated 6 years ago
- WIP - Play with Intel VM Extensions☆21Updated 8 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- A tool to dump informations about the caller of a function.☆13Updated 8 years ago
- Hook APIs and send data back to another process with Google Protobufs☆2Updated 2 years ago