TETYYS / ph-malhideLinks
Process Hacker 2 hiding from external applications
☆19Updated 10 years ago
Alternatives and similar repositories for ph-malhide
Users that are interested in ph-malhide are comparing it to the libraries listed below
Sorting:
- Game Hacking Adventures Scripts & Tools☆20Updated 13 years ago
- xLCB plugin for x64dbg☆20Updated 9 years ago
- command-line interface dll injector☆53Updated 8 years ago
- Decrypts Cheat Engine 'protected' trainers☆19Updated 10 years ago
- ☆52Updated 9 years ago
- Simple command-line tool to apply patches exported by x64dbg to running processes☆56Updated 2 months ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Updated 8 years ago
- IDA plugin to patch IDA Pro in memory.☆49Updated 9 years ago
- Tool to automatically make Cheat Engine attach to a process via the command line.☆29Updated 8 years ago
- APISearch Plugin (x86) - A Plugin For x64dbg☆53Updated 7 years ago
- Replaced by https://github.com/Nukem9/SwissArmyKnife. A plugin for simple code signature generation in x64dbg☆44Updated 5 years ago
- x64dbg Dark Theme - Own use☆31Updated 6 years ago
- injects a DLL into a running process or starts a process with DLL being the very first one imported.☆34Updated 13 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Updated 9 years ago
- Sample libraries to be used with IAT Patcher☆36Updated 3 years ago
- APIInfo Plugin (x86) - A Plugin For x64dbg☆50Updated 7 years ago
- Some of the Anti-Debugging Tricks☆29Updated 8 years ago
- ☆26Updated 9 months ago
- Malware monitor template based on MinHook☆17Updated 10 years ago
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Updated 11 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Plugin to label PEB addresses.☆31Updated 8 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 14 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆29Updated 11 years ago
- ☆30Updated 8 years ago
- Anti-AV compilation☆44Updated 12 years ago
- ☆29Updated 4 years ago
- PoC for detecting and dumping process hollowing code injection☆53Updated 7 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 11 years ago