archercreat / packman-deobfuscatorLinks
☆66Updated 6 years ago
Alternatives and similar repositories for packman-deobfuscator
Users that are interested in packman-deobfuscator are comparing it to the libraries listed below
Sorting:
- ☆98Updated 8 years ago
- ☆42Updated 6 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆83Updated 4 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- Intercepting DeviceControl via WPP☆135Updated 6 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆63Updated 5 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- A hypervisor hiding user-mode memory using EPT☆106Updated 7 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆104Updated 4 years ago
- Prototype of hijacking Windows driver dispatch routines in unmapped discardable sections☆55Updated 6 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆116Updated 7 years ago
- ☆107Updated 2 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆128Updated 3 years ago
- ayy debuger☆90Updated last year
- fix vmprotect import function used unicorn-engine.☆97Updated 2 years ago
- Communication via callback☆73Updated 6 years ago
- disable most common windowsx64 systems patchguard☆86Updated 6 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆105Updated 5 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 5 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 5 years ago
- ☆25Updated 7 years ago
- ☆49Updated 5 years ago
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆85Updated 10 years ago
- Capcom wrapper with safety in mind.☆82Updated 7 years ago
- ☆38Updated 8 years ago
- Using DKOM to hide kernel mode drivers☆56Updated 7 years ago
- Ghetto user mode emulation of Windows kernel drivers.☆150Updated last year
- ☆50Updated 6 years ago