Linking pages
- Native function and Assembly Code Invocation - Check Point Research https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/ 0 comments
- Dealing With API Hashing Using Qiling in Ghidra // Dino Hacks https://dinohacks.com/posts/2024/2024-06-21-dealing-with-api-hashing-using-qiling/ 0 comments
Linked pages
- GitHub - x64dbg/x64dbg: An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis. https://github.com/x64dbg/x64dbg 24 comments
- GitHub - qilingframework/qiling: A True Instrumentable Binary Emulation Framework https://github.com/qilingframework/qiling 5 comments
- Native function and Assembly Code Invocation - Check Point Research https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/ 0 comments
- secret club | We Break Software https://secret.club/ 0 comments
- GitHub - ionescu007/Simpleator: Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5". https://github.com/ionescu007/Simpleator 0 comments
- GitHub - 0vercl0k/wtf: wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows. https://github.com/0vercl0k/wtf 0 comments