Some examples of anti debug techniques used in malware or commercial products preventing analysts to debug code of app.
☆22Apr 18, 2020Updated 5 years ago
Alternatives and similar repositories for Anti-Debug-examples-Windows
Users that are interested in Anti-Debug-examples-Windows are comparing it to the libraries listed below
Sorting:
- A simple DLL to bypass the anti debugging methods from GH Anti Debugging with explanation☆59May 21, 2020Updated 5 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- Test for Anti-Debugging☆16Oct 17, 2018Updated 7 years ago
- Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA☆25Jan 28, 2022Updated 4 years ago
- Sample for Creating a new kernel object type and supporting API☆27Sep 7, 2024Updated last year
- Let's get familiar with Windows pwn 😎☆61Feb 24, 2020Updated 6 years ago
- x86 and x64 assembly "read-eval-print loop" for Windows☆35Aug 13, 2017Updated 8 years ago
- InHouse safetynet killer☆31Jun 23, 2019Updated 6 years ago
- LPE exploit for a UAF in Windows (CVE-2021-40449).☆45Nov 5, 2021Updated 4 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- A collection of interesting ELF files for inspiration and testing☆31Jan 25, 2023Updated 3 years ago
- open source val internal cheat☆73Jul 31, 2024Updated last year
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Basic Source, Very Clean Esp, and Code [ Self Coded ]☆50Nov 23, 2025Updated 3 months ago
- An x86 OS written from scratch in C☆37Jan 10, 2018Updated 8 years ago
- An application built to monitor CS:GO prices on the Steam market☆13Dec 29, 2021Updated 4 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Stable device tree for custom ROMs with OSS vendor for the Redmi K30 5G/K30i 5G.☆10Jul 3, 2024Updated last year
- Activate Windows & Office 🔑☆13Jun 15, 2024Updated last year
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated last month
- A collection of algorithms to reverse using partial information various hashes used by Minecraft to seed its ChunkRandom PRNG.☆10Mar 7, 2024Updated last year
- FELICS Framework☆11Dec 5, 2019Updated 6 years ago
- A 16-bit Operating System☆32Sep 7, 2025Updated 5 months ago
- This is just a x64dbg script system support.☆48Jul 6, 2022Updated 3 years ago
- A minimalistic operating system☆40Dec 7, 2022Updated 3 years ago
- Crackmes Keygenmes Serialmes y más☆43Sep 11, 2022Updated 3 years ago
- source code for the examples and topics from the book☆10Mar 11, 2019Updated 6 years ago
- fractal video feedback demo as a PC master boot record☆18Oct 15, 2011Updated 14 years ago
- lowlevel cyber course - riscv & i8086 competition☆11Jan 12, 2019Updated 7 years ago
- A modular Android debloating tool☆10Jul 30, 2022Updated 3 years ago
- I-D that describes the algorithm identifiers for NIST's PQC ML-DSA for use in the Internet X.509 Public Key Infrastructure☆14Oct 30, 2025Updated 4 months ago
- A set of tools developed in C# aiding disassembly and conversion of PowerPC to C++☆12Jul 25, 2022Updated 3 years ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆11Sep 14, 2024Updated last year
- a simple android app for capturing and sending raw packets☆11Oct 21, 2019Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- Attacking the Nintendo 3DS Boot ROMs☆13Feb 2, 2018Updated 8 years ago
- POC of integrity checks☆14May 31, 2021Updated 4 years ago
- Attempting to self-host with a high level compiler☆12Mar 30, 2022Updated 3 years ago