guided-hacking / anti-debuggingLinks
Anti-debugging techniques on a (bad looking) Win32 application.
☆11Updated last year
Alternatives and similar repositories for anti-debugging
Users that are interested in anti-debugging are comparing it to the libraries listed below
Sorting:
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆71Updated 3 years ago
- ☆46Updated 4 years ago
- IDA Map File Symbol Renamer☆24Updated 10 months ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆27Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Updated 4 years ago
- Collaboration platform for reverse engineering tools.☆46Updated last year
- Code virtualizer☆26Updated 9 years ago
- vdk is a set of utilities used to help with exploitation of a vulnerable driver.☆46Updated 3 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Updated 2 years ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆100Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆67Updated 2 years ago
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆71Updated 6 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Updated 3 years ago
- A list of awesome resources about HyperDbg☆77Updated 4 months ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆36Updated 5 years ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆38Updated last year
- A Binary Ninja plugin to deobfuscate Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆38Updated last year
- devirtualization vmprotect☆65Updated 2 years ago
- ☆30Updated 4 years ago
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated last year
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- Documents the reverse engineering and partial disabling of Steam's CEG anti-tamper protections in T6SP, while preserving its anti-piracy …☆55Updated 9 months ago
- A simple bypass for Steam's `ThreadHideFromDebugger` anti-debugging technique.☆42Updated 5 years ago
- WinLicense key extraction via Intel PIN☆107Updated last year
- Allows you to parse all messages sent to DbgPrint without any process interaction.☆32Updated 5 years ago
- ASUSTeK AsIO3 I/O driver unlock☆23Updated 4 years ago
- paste string formatted byte data block into x64dbg easy.☆42Updated 5 years ago
- DENUVO v1-v2 Virtual Machine profiling tool and Electronic Arts Origin decoder☆52Updated 4 months ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆36Updated 2 years ago
- Windows kernel driver template for cmkr (with testsigning).☆36Updated 2 years ago