ZwProcessHollowing
x64dbg
ZwProcessHollowing | x64dbg | |
---|---|---|
1 | 32 | |
75 | 43,229 | |
- | 0.6% | |
1.8 | 9.0 | |
about 1 year ago | 11 days ago | |
C++ | C++ | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ZwProcessHollowing
x64dbg
- we need a 2015E revival.
-
Too Many Fonts in Windows 10 Can Cause Slow Application Starts
I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person.
[1] https://remedybg.handmade.network/
[2] https://x64dbg.com/
-
Advice needed on disabling license checks on some old proprietary abandonware
I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version.
- Looking for x64 emulator to learn assembly ?
-
C/C++: Where is the address of a declared variable stores?
One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address. You start to see how different containers store data. I find it fascinating.
-
Is there a tool that can show you an EIP trace of a game?
If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com.
-
Star Wars Squadrons Windows 7 help (epic games ea origin)
close origin and download this debugger https://github.com/x64dbg/x64dbg/releases
- Lulu não foi eleito pelo povo brasileiro. Foi escolhido pelo sistema eleitoral
-
How do I get opcode instructions from hexdump
.exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg.
-
DayZ running on Apple Silicon 🔥
Patch the DayZServer_x64.exe, change "test al, al" to "cmp al, 2". i used x64dbg (https://x64dbg.com) a good video for the whole process: https://drive.google.com/file/d/1F1A0lpumREPXtVeoTMq1HiEnvaZp-NUU/view
What are some alternatives?
inline_syscall - Inline syscalls made easy for windows on clang
ghidra - Ghidra is a software reverse engineering (SRE) framework
Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
dnSpy - .NET debugger and assembly editor [Moved to: https://github.com/dnSpy/dnSpy]
syser - syser debugger x32/x64 ring3 with source level debugging/watch view/struct view
dnSpy
Corth - It's like Porth, but in C++. Yep, we're going full circle.
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
Orca - Orca is an Advanced Malware with multifeatures written in C/C++ , work on all windows versions !
pycdc - C++ python bytecode disassembler and decompiler
Disassembler
Scylla - Imports Reconstructor