fobricia / QuickUnpackLinks
The program is intended for a dynamic unpacking of binders, crypters, packers and protectors
☆10Updated 5 years ago
Alternatives and similar repositories for QuickUnpack
Users that are interested in QuickUnpack are comparing it to the libraries listed below
Sorting:
- ☆23Updated 2 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆42Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32Updated 3 years ago
- ☆26Updated 2 years ago
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- partially disable patchguard up to win11 21H2☆19Updated last year
- Disk based DMA for ATA and SCSI☆36Updated 2 years ago
- x64 Windows implementation of virtual-address to physical-address translation☆45Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- ☆38Updated 2 years ago
- Me fockin' pe protector☆45Updated 3 years ago
- Native API header files for the Process Hacker project (nightly).☆25Updated 2 months ago
- A poc that abuses Enclave☆40Updated 3 years ago
- Windows driver template, using C++20 & cmake & GithubActions☆23Updated last year
- A Simple Example☆23Updated 7 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- A simple way to spoof return addresses using an exception handler☆43Updated 3 years ago
- EDR PoC WIP LLC☆10Updated last year
- Small OBJ/Archive Obfuscation framework☆12Updated 2 years ago
- Binary DisASseMbler☆24Updated 3 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆97Updated 3 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Updated 3 years ago
- Visual Studio Project example for using Microsoft's STL in WDM (Windows Kernel-mode Driver)☆25Updated 4 years ago
- Experiment to use sections as User/Kernelmode comm vector☆22Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆18Updated 3 years ago