CKCat / VMProtect-2-Reverse-EngineeringLinks
☆23Updated 3 years ago
Alternatives and similar repositories for VMProtect-2-Reverse-Engineering
Users that are interested in VMProtect-2-Reverse-Engineering are comparing it to the libraries listed below
Sorting:
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- ☆36Updated 3 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆74Updated 3 years ago
- fix vmprotect import function used unicorn-engine.☆97Updated 2 years ago
- VMP Mutation API Fix☆42Updated 3 years ago
- vmp2.x devirtualization☆83Updated 11 months ago
- This is just a x64dbg script system support.☆47Updated 3 years ago
- VMProtectTest☆40Updated 2 years ago
- Code virtualizer☆25Updated 9 years ago
- a simple intel vt code both support x86 & x64. PatchGuard monitor.☆76Updated 4 years ago
- Open Anti Cheat☆27Updated 3 years ago
- Global DLL injector☆68Updated 4 years ago
- ☆26Updated 2 years ago
- Example of hijacking system calls via function pointer tables☆31Updated 4 years ago
- ☆37Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆44Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆37Updated 5 years ago
- intel vt-x hypervisor ept☆24Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year
- Black Signature Driver☆24Updated 2 years ago
- ☆43Updated 2 years ago
- Decoder for VMProtect hwids☆17Updated 3 years ago
- Analysing and defeating PatchGuard universally☆36Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 3 years ago
- ☆52Updated 2 years ago
- ☆27Updated 7 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆27Updated 5 years ago