yellowbyte / analysis-of-anti-analysisView external linksLinks
writings on anti-reverse engineering.
☆290Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for analysis-of-anti-analysis
Users that are interested in analysis-of-anti-analysis are comparing it to the libraries listed below
Sorting:
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Oct 26, 2025Updated 3 months ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆35Aug 3, 2018Updated 7 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆82Sep 1, 2018Updated 7 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆742Mar 17, 2019Updated 6 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- Playing with the Tigress software protection. Break some of its protections and solve their reverse engineering challenges. Automatic deo…☆881Nov 21, 2023Updated 2 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- A DBI tool to discover heap memory related bugs☆126Jun 25, 2018Updated 7 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Apr 9, 2018Updated 7 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Collaborative Reverse Engineering plugin for IDA Pro & Hex-Rays☆663Feb 17, 2021Updated 5 years ago
- An analysis of the Warbird virtual-machine protection for the CI!g_pStore☆265Feb 6, 2018Updated 8 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆13Oct 10, 2018Updated 7 years ago
- ☆181Nov 25, 2018Updated 7 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- IDA Pro plugin to assist with complex graphs☆322Apr 10, 2023Updated 2 years ago
- A tool to help when dealing with Windows IOCTL codes or reversing Windows drivers.☆436Aug 22, 2018Updated 7 years ago
- Windows build files for the VMHunt Intel PIN Trace tool☆19Nov 26, 2018Updated 7 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆95Nov 4, 2021Updated 4 years ago
- Runtime memory analysis framework to identify Android malware☆147Apr 24, 2018Updated 7 years ago
- This is a simple driver with x64 inline assembly☆57Jun 26, 2020Updated 5 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Hypervisor-based debugger☆191Dec 2, 2020Updated 5 years ago
- hook msr by amd svm☆125Dec 30, 2019Updated 6 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆96Aug 22, 2018Updated 7 years ago
- ☆82Dec 3, 2017Updated 8 years ago
- Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).☆118Aug 8, 2018Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Jul 2, 2025Updated 7 months ago