Windows User Space Emulator

A high-performance Windows process emulator that operates at the syscall level, providing full control over process execution through comprehensive hooking capabilities. Built in C++ and powered by the Unicorn Engine. ## Key Features * __Syscall-Level Emulation__: Instead of reimplementing Windows APIs, the emulator operates at the syscall level, allowing it to leverage existing system DLLs * __Advanced Memory Management__: Supports Windows-specific memory types including reserved, committed, built on top of Unicorn's memory management * __Complete PE Loading__: Handles executable and DLL loading with proper memory mapping, relocations, and TLS * __Exception Handling__: Implements Windows structured exception handling (SEH) with proper exception dispatcher and unwinding support * __Threading Support__: Provides a scheduled (round-robin) threading model * __State Management__: Supports both full state serialization and fast in-memory snapshots * __Debugging Interface__: Implements GDB serial protocol for integration with common debugging tools (IDA Pro, GDB, LLDB, VS Code, ...) Perfect for security research, malware analysis, and DRM research where fine-grained control over process execution is required. ## Code Disclaimer The project is still in a very early, prototypy state. The code still needs a lot of cleanup and many features and syscalls need to be implemented. However, constant progress is being made :) ## Preview ![Preview](./docs/images/preview.jpg) ## YouTube Overview [![YouTube video](./docs/images/yt.jpg)](https://www.youtube.com/watch?v=Y6NXwI7x7Og) Click here for the slides.