PELock / CrackMeZ3S-CTF-CrackMe-Tutorial
How to write a CrackMe for a CTF competition. Source code, technical explanation, anti-debugging and anti reverse-engineering tricks.
☆47Updated 2 years ago
Alternatives and similar repositories for CrackMeZ3S-CTF-CrackMe-Tutorial:
Users that are interested in CrackMeZ3S-CTF-CrackMe-Tutorial are comparing it to the libraries listed below
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- ☆22Updated 4 years ago
- PoC for detecting and dumping process hollowing code injection☆51Updated 6 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 7 years ago
- This is a simple driver with x64 inline assembly☆54Updated 4 years ago
- A DLL that performs IAT hooking☆27Updated 6 years ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Updated 6 years ago
- Yet another Windows DLL injector.☆39Updated 3 years ago
- Windows 10 UAC bypass PoC using LaunchInfSection☆34Updated 6 years ago
- IDA plugin to deobfuscate emotet CFF☆17Updated 3 years ago
- Plugin to patch and remove ASLR from PE files on x64dbg☆38Updated 2 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- ☆22Updated 4 years ago
- Kernel-Mode rootkit that connects to a remote server to send & recv commands☆31Updated 6 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆72Updated last year
- A ready-made template for a project based on libpeconv.☆47Updated 2 months ago
- ☆45Updated 6 years ago
- DirectNtApi - simple method to make ntapi function call without importing or walking export table. Work under Windows 7, 8 and 10☆52Updated last year
- ☆17Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆75Updated 14 years ago
- View handles and object for each object type☆63Updated 5 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- PE Library x86☆21Updated 5 years ago
- LSASS INJECTOR☆35Updated 6 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆56Updated 3 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆56Updated 6 years ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago