Discord-Hash / VMProtect-Ultimate-
x86 x 64
☆29Updated 3 years ago
Alternatives and similar repositories for VMProtect-Ultimate-:
Users that are interested in VMProtect-Ultimate- are comparing it to the libraries listed below
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆44Updated this week
- Detects virtual machines and malware analysis environments☆117Updated 2 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆177Updated last year
- manual map unsigned driver over signed memory☆185Updated 10 months ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆68Updated 2 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆67Updated 2 years ago
- spoof return address☆73Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆45Updated 7 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆41Updated 5 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆113Updated last year
- ☆26Updated 5 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆65Updated last year
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆31Updated 4 months ago
- Compile-Time Calls Obfuscator for C++14+☆38Updated last year
- Compact MBR Bootkit for Windows☆45Updated 3 years ago
- DSE & PG bypass via BYOVD attack☆42Updated 10 months ago
- codecave hook reverse engineering toolkit.☆37Updated last year
- Use RTCore64 to map your driver on windows 11.☆96Updated 10 months ago
- hidden_syscall - syscaller without using syscall instruction in code☆60Updated 2 years ago
- ☆41Updated 3 years ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆163Updated last year
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆94Updated 5 months ago
- ntoskrnl .data hooks for UM-KM communication☆36Updated 8 months ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆51Updated 5 months ago
- PoC kernel to usermode injection☆73Updated 11 months ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆11Updated 10 months ago
- Header only library for obfuscation import winapi functions.☆39Updated last week