KuNgia09 / bypass_vmp_vm_detectView external linksLinks
bypass vmp virtual machine detect
☆147Aug 5, 2022Updated 3 years ago
Alternatives and similar repositories for bypass_vmp_vm_detect
Users that are interested in bypass_vmp_vm_detect are comparing it to the libraries listed below
Sorting:
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆72Oct 7, 2022Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Aug 27, 2022Updated 3 years ago
- Kernel driver for detecting Intel VT-x hypervisors.☆192Jul 11, 2023Updated 2 years ago
- Fix VMProtect3 IAT☆305Dec 5, 2023Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆31Feb 8, 2021Updated 5 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- 之前学习X64VT写的代码,很多坑,但是大体的逻辑还是完整的。现发出来给更多想学VT的人参考...☆71Apr 26, 2021Updated 4 years ago
- 🪝 Various EPT hook detection approaches☆143Jul 29, 2025Updated 6 months ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆77Feb 9, 2022Updated 4 years ago
- ☆421Jan 1, 2025Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆20Dec 29, 2021Updated 4 years ago
- ☆73Aug 31, 2022Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- direct systemcalls with a modern c++20 interface.☆45Jan 6, 2023Updated 3 years ago
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,384Jun 11, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆478Aug 31, 2021Updated 4 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- BattlEye kernel module bypass☆178Oct 1, 2022Updated 3 years ago
- Drawing from kernelmode without any hooks☆174Jul 7, 2022Updated 3 years ago
- vmp2.x devirtualization☆90Nov 3, 2024Updated last year
- BattlEye shellcodes tester☆152Jan 3, 2022Updated 4 years ago
- neat way to detect memory read using nt layer function.☆14Aug 4, 2023Updated 2 years ago
- a debugger use vt technology☆355Jun 30, 2022Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107May 10, 2022Updated 3 years ago
- ☆174Mar 9, 2022Updated 3 years ago
- A simple way to spoof return addresses using an exception handler☆43Aug 3, 2022Updated 3 years ago
- ☆47Nov 26, 2020Updated 5 years ago
- a minimalistic windows hypervisor for amd processors☆138Jun 30, 2022Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆547Nov 12, 2022Updated 3 years ago
- 09/2021 reversal of EasyAntiCheat driver☆234Dec 21, 2021Updated 4 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- Mono process injector☆22Jan 26, 2019Updated 7 years ago
- comparing data of module exports from disk and memory, then caching any differences.☆26Dec 11, 2021Updated 4 years ago
- Extensions for x64dbg written in Rust: Telescope and Unicorn powered disassembly☆26May 31, 2023Updated 2 years ago
- Lightweight Intel VT-x Hypervisor.☆660Dec 17, 2024Updated last year
- Obfuscate calls to imports by patching in stubs☆72Aug 4, 2021Updated 4 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆469Jan 3, 2022Updated 4 years ago