arsium / AntiDebugLinks
Anti-Debug methods with C#
☆14Updated 4 years ago
Alternatives and similar repositories for AntiDebug
Users that are interested in AntiDebug are comparing it to the libraries listed below
Sorting:
- Injecting shellcode into a process memory and executing it in C#☆54Updated 2 years ago
- Detect VirtualBox, SandBox, Emulator, Debugger, Hosting, Processes in C#☆20Updated 5 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Updated 4 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆48Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Plugin Driven Remote Administration Tool (Unsupported)☆14Updated 9 years ago
- This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the ha…☆73Updated 5 years ago
- A library to hook functions !☆20Updated 3 years ago
- Obfuscator To Protect .NET Assemblies From Being Reverse Engineered.☆38Updated 4 years ago
- PoC: Protecting Joe User from killing his own process.☆9Updated 7 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- A small shellcode loader library written in C#☆47Updated 3 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆106Updated 2 years ago
- A lightweight .NET assembly dependency merger that uses dnLib and 7zip's LZMA SDK for compressing dependant assemblies.☆103Updated 11 months ago
- POC runtime crypter☆9Updated 6 years ago
- Easy XOR string encryption for NET based binaries☆139Updated last year
- C# source code obfuscator☆18Updated 6 years ago
- Packer compressing .net assemblies, (ab)using the PE format for data storage☆172Updated 2 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆14Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆27Updated 3 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- Framework for C# development☆71Updated last week
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Updated 3 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 3 years ago
- DotNet Obfuscator/Packer☆103Updated 5 years ago
- C# library to load a native DLL from memory without the need to allow unsafe code☆92Updated 6 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆18Updated 5 years ago