dslee2022 / VMProtect-CRC-BypassLinks
PoC code for IsValidImageCRC()
☆20Updated 2 years ago
Alternatives and similar repositories for VMProtect-CRC-Bypass
Users that are interested in VMProtect-CRC-Bypass are comparing it to the libraries listed below
Sorting:
- Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide☆23Updated 2 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆42Updated 4 years ago
- PoC kernel to usermode injection☆88Updated last year
- ☆26Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆69Updated 3 years ago
- Titan is a VMProtect devirtualizer☆54Updated 2 years ago
- ☆37Updated 2 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆47Updated last month
- A debugger library using VEH.☆65Updated last year
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆104Updated 2 years ago
- WIP PoC for license emulation in Oreans products☆43Updated 3 weeks ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- Kernel ReClassEx☆64Updated last year
- vmp .net devirtualizer☆55Updated last week
- VMProtect2 Deobfuscation Tooling☆57Updated 3 weeks ago
- A devirtualization engine for Themida.☆101Updated last year
- cr3 shuffle driver☆65Updated last year
- ☆32Updated last year
- C++ Program used to dump Themida and VMProtect.☆31Updated last year
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆129Updated 4 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆63Updated last year
- Using ioctl major function swaps to "spoof" the ARP table☆15Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆31Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆53Updated 2 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆30Updated 10 months ago