archercreat / packman-deobfuscatorLinks
☆67Updated 6 years ago
Alternatives and similar repositories for packman-deobfuscator
Users that are interested in packman-deobfuscator are comparing it to the libraries listed below
Sorting:
- ☆99Updated 8 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆106Updated 5 years ago
- ☆43Updated 7 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆118Updated 7 years ago
- Intercepting DeviceControl via WPP☆136Updated 6 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Updated 4 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- fix vmprotect import function used unicorn-engine.☆98Updated 2 years ago
- Communication via callback☆73Updated 6 years ago
- A hypervisor hiding user-mode memory using EPT☆107Updated 8 years ago
- ayy debuger☆89Updated last year
- A mini anti-anti debug hooking library for Windows.☆106Updated 5 years ago
- Hooking SSDT with Avast Internet Security Hypervisor☆115Updated 6 years ago
- VAC3 (Valve Anti-Cheat 3) module emulator☆101Updated 5 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Capcom wrapper with safety in mind.☆83Updated 7 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆111Updated 5 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Updated 6 years ago
- BattlEye x64 usermode injector☆66Updated 6 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆130Updated 3 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 6 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆103Updated 2 years ago
- Unpacking VMProtected Executable Guide☆124Updated 5 years ago
- BattlEye Emulator, modified from slicktors work.☆14Updated 7 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- ☆109Updated 2 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- A library to read physical memory and system-wide virtual memory.☆128Updated 7 years ago