Dump-GUY / CrackMe-ExamplesLinks
Some of CrackMes made by me :)
☆18Updated 4 years ago
Alternatives and similar repositories for CrackMe-Examples
Users that are interested in CrackMe-Examples are comparing it to the libraries listed below
Sorting:
- ☆75Updated 2 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- ☆24Updated last year
- ☆29Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Updated 3 years ago
- MalUnpack companion driver☆99Updated last year
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Updated last year
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 10 months ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- A set of small utilities, helpers for PIN tracers☆35Updated 2 months ago
- ☆37Updated 9 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- A post-processing script for TinyTracer☆39Updated 2 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated 4 months ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Simple API Hooks detector☆76Updated 3 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- A PE parser written in C++ which does not uses OOP. Helpful if you want to learn about PE parsing.☆17Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Analysis tool for estimating the likelihood that a binary contains compressed or encrypted bytes☆46Updated last year
- General malware analysis stuff☆37Updated last year
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆90Updated last year
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆34Updated 3 years ago
- ☆10Updated 3 years ago
- Code from process of reversing Sysinternals Suite for educational purposes, with videos to associate them☆48Updated 2 years ago