PELock / CMemPatchLinks
A simple class in C++ to load and read/write process memory, it comes with an example of how to decrypt the once popular demoscene e-zine HUGI data archives.
☆18Updated 10 years ago
Alternatives and similar repositories for CMemPatch
Users that are interested in CMemPatch are comparing it to the libraries listed below
Sorting:
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Windows hidden thread suspend POC with code injection☆12Updated 8 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 13 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆19Updated 2 years ago
- Game Hacking Adventures Scripts & Tools☆20Updated 12 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆22Updated 4 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Updated 8 years ago
- Formely KMon, a Windows Kernel Driver designed to prevent malware attacks by monitoring the creation of registry keys in common autorun l…☆21Updated 11 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 10 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- PC Game Modding☆10Updated 2 years ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆22Updated 12 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆36Updated 11 years ago
- IDA plugin investigating the internal representation of IDC scripts☆14Updated last year
- Wow64 syscall hook☆40Updated 8 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Updated 6 years ago
- ☆20Updated 5 years ago
- DLL Injection commandline utility☆26Updated 12 years ago
- DLL and API hooking example to hide running in a Terminal Session☆19Updated 5 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆41Updated 11 years ago
- Low-level MS Windows registry files analysis tools☆20Updated 9 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆28Updated 10 years ago
- lojax_uefi_rootkit_checker☆18Updated 6 years ago
- Hiding kernel-driver for x86/x64.☆8Updated 6 months ago
- Local Api Hooker coded in MASM☆9Updated 6 years ago
- String Encryption and File Encryption for C/C++, C#, Visual Basic .NET, Delphi/Pascal/Object Pascal, Java, JavaScript, Python, Ruby, Auto…☆26Updated 6 years ago
- IDA recompiler☆31Updated 10 years ago