eybee / Enigma-DeVirtualizer
☆13Updated 7 years ago
Alternatives and similar repositories for Enigma-DeVirtualizer:
Users that are interested in Enigma-DeVirtualizer are comparing it to the libraries listed below
- Some eternal WIP stuff :)☆16Updated last week
- C++ Program used to dump Themida and VMProtect.☆23Updated last year
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago
- Simple driver loader for windows☆18Updated 4 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆19Updated 2 months ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- ☆15Updated 4 years ago
- fork HoShiMin Avanguard☆19Updated 6 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Updated 4 years ago
- A simple example how to decrypt kernel debugger data block☆27Updated 4 years ago
- Disable threat tracing from the kernel..☆13Updated 2 years ago
- ☆27Updated last year
- Remote memory library in C++17.☆31Updated 6 years ago
- Decoder for VMProtect hwids☆17Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- x64 assembler library☆31Updated 9 months ago
- easy to use vtable hook with RTTI support☆23Updated 5 years ago
- Small class to help perform syscalls.☆21Updated last year
- Black Signature Driver☆22Updated last year
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆33Updated 3 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- ☆21Updated 2 years ago
- ☆34Updated 4 years ago
- Enables x64 applications to call any x86 function through a special function called X86Call☆17Updated 8 years ago
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆20Updated 3 years ago
- A lightweight x86/x64 VM☆18Updated 4 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago