Some of the Anti-Debugging Tricks
☆29Feb 20, 2017Updated 9 years ago
Alternatives and similar repositories for Anti-Debug
Users that are interested in Anti-Debug are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugins for Scylla☆20Sep 14, 2011Updated 14 years ago
- Technical Notes☆16Dec 1, 2017Updated 8 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Large Scale Cumulative Binary Diffing.☆25Mar 10, 2018Updated 8 years ago
- IDAPython scripts☆15Aug 24, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Underconstrained symbolic execution for cryptography verification☆19Mar 26, 2021Updated 5 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- Hook, DLLInject, PE_Tool☆34Nov 2, 2018Updated 7 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A command line Swiss army knife for string and number conversions☆18Feb 27, 2026Updated last month
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 7 years ago
- A simple tool to convert the IP to a DWORD IP☆144Jul 29, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Yet Another Sig Scanner☆34Jul 18, 2018Updated 7 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Pwn2Win CTF 2018 NIZK (Non-Interactive Zero-Knowledge) Platform☆30Dec 2, 2018Updated 7 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆26Oct 28, 2014Updated 11 years ago
- ☆18Mar 1, 2021Updated 5 years ago
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Intel-Process communitation☆10Feb 27, 2017Updated 9 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆27May 21, 2014Updated 11 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago