ReverseSec / vmpmyloveLinks
Analyze VMProtect binaries without actually executing any user code.
☆33Updated 4 months ago
Alternatives and similar repositories for vmpmylove
Users that are interested in vmpmylove are comparing it to the libraries listed below
Sorting:
- codecave hook reverse engineering toolkit.☆37Updated last year
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆14Updated 6 months ago
- Makes IDA (most versions) to crash upon opening it.☆101Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated 11 months ago
- C++ Program used to dump Themida and VMProtect.☆29Updated last year
- PoC kernel to usermode injection☆87Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆44Updated last year
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆72Updated last month
- Detects virtual machines and malware analysis environments☆138Updated 2 years ago
- C/C++ antidebugging library for Windows☆37Updated 3 weeks ago
- A kernel injector for EAC and BE☆131Updated last year
- Kernel Level NMI Callback Blocker☆119Updated last year
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆23Updated 2 years ago
- ☆46Updated 7 months ago
- manual map unsigned driver over signed memory☆201Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆61Updated last year
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆44Updated last year
- A Dynamic Study Vmprotect 1.x-1.9X Unpacking Toolkit, Recovery OEP, FIX PE, IAT and bypass protection with custom Loader and interceptor …☆34Updated 2 years ago
- Just tried, unusable☆43Updated 10 months ago
- ☆144Updated last month
- hidden_syscall - syscaller without using syscall instruction in code☆62Updated 2 years ago
- Crashes ida on static analyses.☆104Updated 4 months ago
- a always updated and undetected temp spoof driver☆27Updated 5 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆74Updated last year
- ☆81Updated last year
- PAGE_GUARD based hooking library☆48Updated 3 years ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆126Updated last year
- Library containing Anti-RE and Anti-Debug methods.☆112Updated 4 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago