CKCat / VMProtect-2-Reverse-Engineering
☆21Updated 3 years ago
Alternatives and similar repositories for VMProtect-2-Reverse-Engineering:
Users that are interested in VMProtect-2-Reverse-Engineering are comparing it to the libraries listed below
- ☆36Updated 2 years ago
- ☆36Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- ☆16Updated 2 years ago
- Black Signature Driver☆23Updated last year
- VMProtectTest☆35Updated 2 years ago
- Code virtualizer☆23Updated 8 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- intel vt-x hypervisor ept☆25Updated 4 years ago
- ☆33Updated last year
- Open Anti Cheat☆27Updated 2 years ago
- ☆27Updated last year
- VMP Mutation API Fix☆41Updated 3 years ago
- Logging library for kernel drivers written for the Windows NT operating system.☆19Updated last month
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- 对debughelp的二次开发☆11Updated 2 years ago
- Static Library For Windows Drivers☆33Updated 2 months ago
- Example of hijacking system calls via function pointer tables☆31Updated 3 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- This is just a x64dbg script system support.☆46Updated 2 years ago
- Windows Research Kernel VS2022 Solution☆30Updated 7 months ago
- ☆34Updated 4 years ago
- vmp2.x devirtualization☆73Updated 5 months ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆21Updated 7 months ago
- pointer obfuscation☆25Updated 7 years ago
- windows kernel pagehook☆39Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆28Updated 4 years ago
- G-Presto Anti-Cheat Reverse Engineered.☆22Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago