brock7 / xdbgLinks
Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.
☆207Updated 8 years ago
Alternatives and similar repositories for xdbg
Users that are interested in xdbg are comparing it to the libraries listed below
Sorting:
- A memory scanner plugin for x64dbg, inspired by Cheat Engine.☆299Updated 2 years ago
- Strings plugin for x64dbg☆232Updated this week
- driver mapper / capcom wrapper☆220Updated 5 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆295Updated 4 years ago
- SimpleSvmHook is a research purpose hypervisor for Windows on AMD processors.☆403Updated 4 years ago
- A VMP to VTIL lifter.☆436Updated 4 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆439Updated 4 years ago
- PatchGuard Research☆302Updated 6 years ago
- This program remaps its image to prevent the page protection of pages contained in the image from being modified via NtProtectVirtualMemo…☆601Updated 6 years ago
- pseudo-code to show how to disable patchguard with win10☆296Updated 7 years ago
- PE permutation library☆273Updated 2 years ago
- Plugin for x64dbg Linker/Compiler/Tool detector.☆168Updated this week
- RootKit & Cheat Scanner - Windows☆218Updated 5 years ago
- C++17 PE manualmapper☆360Updated 3 years ago
- Hide Driver By MiProcessLoaderEntry☆287Updated 6 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆143Updated 7 years ago
- Handle elevation DKOM against ObRegisterCallbacks☆303Updated 6 years ago
- Debug Child Process Tool (auto attach)☆292Updated last year
- Exploiting CPU-Z Driver To Turn Load Unsigned Drivers☆128Updated 7 years ago
- Detecting execution of kernel memory where is not backed by any image file☆260Updated 6 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆361Updated 10 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆223Updated 7 years ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆247Updated 4 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆302Updated 5 years ago
- A collection of x64dbg scripts. Feel free to submit a pull request to add your script.☆526Updated last year
- ClassInformer backported for IDA Pro 7.0☆358Updated 5 years ago
- Windows kernel samples☆253Updated 6 years ago
- Simple code to manipulate the memory of a usermode process from kernel.☆275Updated 8 years ago
- Hooking kernel functions by abusing alignment☆243Updated 4 years ago
- Disable DSE and WinTcb (without breaking DRM)☆439Updated 8 years ago