Empier / MemoryEditorLinks
[C#]Main.exe < - > [C_DLL] < - > [C_KERNEL] = Memory_Editor via Kernel
☆33Updated 6 years ago
Alternatives and similar repositories for MemoryEditor
Users that are interested in MemoryEditor are comparing it to the libraries listed below
Sorting:
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- Window Executable file Function tracer using Debugging API☆44Updated 5 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- Windows 10 kernel and ntdll internal types, directly compatible with ida.☆52Updated 6 years ago
- Stealth DLL injector☆89Updated last year
- Wow64 syscall hook☆41Updated 8 years ago
- reverse engineering extension plugin for windbg☆119Updated 5 years ago
- x64dbg stylesheet like visual studio dark theme☆42Updated 8 years ago
- A Windows game hacking framework☆41Updated 9 years ago
- simple PE packer written in C++☆55Updated 7 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 10 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Fix API against Themida API Redirection/Jump Trick with Cheat Engine Lua Script☆32Updated 5 years ago
- Analyze PatchGuard☆59Updated 7 years ago
- BattlEye Emulator, modified from slicktors work.☆14Updated 6 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 6 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- ☆37Updated 10 years ago
- x64dbg conditional branches logger [Plugin]☆72Updated 8 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure☆36Updated last year
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- This is a simple driver with x64 inline assembly☆57Updated 5 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 14 years ago
- APISearch Plugin (x86) - A Plugin For x64dbg☆52Updated 7 years ago
- (Ab)using the XIGNCODE3 driver to open a handle to any process.☆64Updated 7 years ago
- Windows sandbox PoC☆32Updated 5 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Updated 6 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago