Rattpak / CEG-Anti-Tamper-AnalysisLinks
Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy checks
☆53Updated 3 months ago
Alternatives and similar repositories for CEG-Anti-Tamper-Analysis
Users that are interested in CEG-Anti-Tamper-Analysis are comparing it to the libraries listed below
Sorting:
- Collection of Cheat dumps for Research and Detection.☆16Updated last month
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- ☆22Updated 3 weeks ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Updated 5 months ago
- devirtualization vmprotect☆62Updated 2 years ago
- Generate a PDB file given the old PDB file and an address mapping☆49Updated 3 weeks ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆62Updated last year
- x86-64 user mode emulation using Zydis☆55Updated this week
- 🎨 Seamlessly convert your favorite Visual Studio Code themes to IDA Pro themes.☆114Updated last year
- A x86_64 software emulator☆148Updated last week
- How Meltdown and Spectre haunt Anti-Cheat: DVRT details☆22Updated last year
- Simple anti-instrumentation with EFLAGS.AC☆18Updated 5 months ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- ☆33Updated last year
- Port of zentool to Windows☆26Updated 5 months ago
- ☆30Updated 3 years ago
- Lightweight PDB symbol parser and resolver☆26Updated 10 months ago
- Native opaque predicate cleaner plugin for Binary Ninja☆37Updated this week
- A fast Windows emulator + debugger for reverse engineering. Runs any executable in debug mode, disassembles with Zydis, emulates instruct…☆118Updated this week
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆35Updated last year
- monitors hidden syscalls called from call of duty anticheat☆83Updated 7 months ago
- Me fockin' pe protector☆45Updated 2 years ago
- A Binary Ninja plugin to detect Themida, WinLicense and Code Virtualizer's obfuscated code locations.☆82Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆67Updated last month
- Kernel ReClassEx☆64Updated last year
- A C++ wrapper for icedx86 decoder☆32Updated last month
- WinLicense key extraction via Intel PIN☆101Updated last year
- A devirtualization engine for Themida.☆100Updated last year
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆33Updated last year
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆25Updated last year