fatrolls / WS2_32-Proxy-DLL
WS2_32 Proxy DLL Perfect for hooking any game you wish to log packets / inject packets etc..
☆23Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for WS2_32-Proxy-DLL
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆31Updated 4 years ago
- VMP Mutation API Fix☆38Updated 2 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Different aproaches to detecting EPT hooks☆84Updated 2 years ago
- A simple EasyAntiCheat x64 emulator.☆46Updated 5 years ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆34Updated 4 years ago
- fix vmprotect import function used unicorn-engine.☆91Updated last year
- x64dbg plugin - AttachHelper☆21Updated 7 years ago
- A simple library which provides a way to read and write the memory of other processes☆50Updated 6 years ago
- ☆28Updated 7 years ago
- Pointer search for any classes using the RTTI feature.☆47Updated 4 years ago
- Modified version of IDA ClassInformer with virtual functions☆60Updated 5 months ago
- Kernel ReClassEx☆62Updated 11 months ago
- disable most common windowsx64 systems patchguard☆83Updated 5 years ago
- VMProtect analysis script☆55Updated 4 years ago
- ☆24Updated 6 years ago
- X86/X64 Hardware Breakpoint Manager☆39Updated 3 years ago
- ☆93Updated 7 years ago
- A ProcMon-esque tool for monitoring Windows Kernel Drivers☆52Updated 3 years ago
- x64 syscall caller in C++.☆84Updated 6 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆60Updated 7 years ago
- An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.☆72Updated 7 years ago
- IDA FunctionStringAssociate PlugIn☆29Updated 9 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆38Updated 6 years ago
- x64 free protect Features 1.process/thread handle protect 2.anti taskmgr.exe 3.hide process 4.anti-debugger(user/kernel debugger)☆79Updated 5 years ago
- A general solution to simulate execution of virtualized instructions (vmprotect/themida, etc.).☆70Updated 2 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆62Updated 2 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆25Updated 4 years ago