Dump-GUY / CrackMe-ExamplesLinks
Some of CrackMes made by me :)
☆18Updated 3 years ago
Alternatives and similar repositories for CrackMe-Examples
Users that are interested in CrackMe-Examples are comparing it to the libraries listed below
Sorting:
- MalUnpack companion driver☆99Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- ☆74Updated last year
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated last month
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆62Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆18Updated 2 years ago
- ☆29Updated 2 years ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 7 months ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated 2 years ago
- ☆37Updated 6 months ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆27Updated 3 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- ☆26Updated 10 months ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- ☆71Updated 2 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- A post-processing script for TinyTracer☆37Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- ☆26Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- ☆14Updated 3 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆71Updated 3 years ago