Arckmed's Stars
xenoscr/manual-syscall-detect
A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.
jackullrich/syscall-detect
PoC capable of detecting manual syscalls from usermode.
rwfpl/rewolf-wow64ext
Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.
m417z/winbindex
An index of Windows binaries, including download links for executables such as exe, dll and sys files
Mixaill/FakePDB
Tool for PDB generation from IDA Pro database
Midi12/QueryWorkingSetExample
Just an example of a well-known technique to detect memory tampering via Windows Working Sets.
thefLink/Hunt-Weird-Syscalls
ETW based POC to identify direct and indirect syscalls
jdu2600/Etw-SyscallMonitor
Monitors ETW for security relevant syscalls maintaining the set called by each unique process
microsoft/krabsetw
KrabsETW provides a modern C++ wrapper and a .NET wrapper around the low-level ETW trace consumption functions.
mandiant/capa
The FLARE team's open-source tool to identify capabilities in executable files.
qicosmos/cinatra
modern c++(c++20), cross-platform, header-only, easy to use http framework
jonomango/chum
Binary rewriter for 64-bit PE files.
atrexus/ws-watcher
A PoC application that detects unauthorized external access to select memory regions.
dracula/dracula-theme
🧛🏻♂️ One theme. All platforms.
gh-nomad/nmd
set of single-header libraries for C/C++. The code is far from finished but some parts are quite usable.
vmi-rs/vmi
Modular and extensible library for Virtual Machine Introspection
wbenny/hvpp
hvpp is a lightweight Intel x64/VT-x hypervisor written in C++ focused primarily on virtualization of already running operating system
Bareflank/hypervisor
lightweight hypervisor SDK written in C++ with support for Windows, Linux and UEFI
tklengyel/drakvuf
DRAKVUF Black-box Binary Analysis
mike1k/pepp
C++ library for parsing and manipulating PE files statically and dynamically.
hzqst/unicorn_pe
Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.
donnaskiez/ac
kernel mode anti cheat
Ahora57/Unabomber
Improved VMP Idea(detect anti-anti-debug tools by bug)
momo5502/emulator
🪅 Windows User Space Emulator
klezVirus/SilentMoonwalk
PoC Implementation of a fully dynamic call stack spoofer
RevEngAI/reai-ida
RevEng.AI IDA Pro Plugin
codecat/ClawSearch
A memory scanner plugin for x64dbg, inspired by Cheat Engine.
KiFilterFiberContext/microsoft-warbird
Reimplementation of Microsoft's Warbird obuscator
hfiref0x/WinObjEx64
Windows Object Explorer 64-bit
mandiant/speakeasy
Windows kernel and user mode emulation.