brock7 / xdbg
Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.
☆196Updated 7 years ago
Alternatives and similar repositories for xdbg:
Users that are interested in xdbg are comparing it to the libraries listed below
- A memory scanner plugin for x64dbg, inspired by Cheat Engine.☆279Updated 2 years ago
- driver mapper / capcom wrapper☆217Updated 5 years ago
- PE permutation library☆268Updated last year
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆372Updated 3 years ago
- A VMP to VTIL lifter.☆429Updated 3 years ago
- Strings plugin for x64dbg☆226Updated this week
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆431Updated 4 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆337Updated 9 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆586Updated 5 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆283Updated 4 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆288Updated 6 years ago
- Detecting execution of kernel memory where is not backed by any image file☆256Updated 6 years ago
- Hide Driver By MiProcessLoaderEntry☆285Updated 5 years ago
- Disable DSE and WinTcb (without breaking DRM)☆429Updated 8 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆142Updated 6 years ago
- C++17 PE manualmapper☆318Updated 3 years ago
- PatchGuard Research☆295Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆219Updated 7 years ago
- ☆243Updated 10 years ago
- Debug Child Process Tool (auto attach)☆280Updated last year
- Kernel Detective☆141Updated 2 years ago
- pseudo-code to show how to disable patchguard with win10☆295Updated 7 years ago
- Simple benchmark for findpattern implementations.☆160Updated 2 weeks ago
- x64 usermode rootkit☆204Updated 6 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆216Updated 6 years ago
- RootKit & Cheat Scanner - Windows☆214Updated 5 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆182Updated 4 years ago
- x86 Binary Code Virtualization Tool☆213Updated last week
- ClassInformer backported for IDA Pro 7.0☆358Updated 4 years ago
- A collection of x64dbg scripts. Feel free to submit a pull request to add your script.☆508Updated 7 months ago