Empier / MemoryEditor
[C#]Main.exe < - > [C_DLL] < - > [C_KERNEL] = Memory_Editor via Kernel
☆31Updated 5 years ago
Alternatives and similar repositories for MemoryEditor:
Users that are interested in MemoryEditor are comparing it to the libraries listed below
- Fix API against Themida API Redirection/Jump Trick with Cheat Engine Lua Script☆29Updated 4 years ago
- Wow64 syscall hook☆40Updated 7 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 5 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- x64dbg plugin - AttachHelper☆21Updated 8 years ago
- Branch based windows debugger☆21Updated 5 years ago
- ☆27Updated 5 years ago
- Analyze PatchGuard☆54Updated 6 years ago
- VEH Redirect & VEH Debugger☆23Updated 4 years ago
- ☆23Updated 7 years ago
- Скрытие строки от отладчиков и декомпиляторов☆49Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- unicorn emulator for x64dbg☆30Updated 6 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆64Updated 12 years ago
- ☆34Updated 9 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- BattlEye Emulator, modified from slicktors work.☆13Updated 6 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆22Updated 9 years ago
- Another method to anti ThreadHideFromDebugger☆35Updated 5 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- Windows sandbox PoC☆31Updated 4 years ago
- Windows driver with usermode interface which can hide objects of file-system and registry, protect processes and etc☆16Updated 6 years ago
- ☆48Updated 6 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago