hovewoof / My-Simple-CrackmeLinks
This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.
☆15Updated last year
Alternatives and similar repositories for My-Simple-Crackme
Users that are interested in My-Simple-Crackme are comparing it to the libraries listed below
Sorting:
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- PAGE_GUARD based hooking library☆47Updated 2 years ago
- a simple obfuscator☆1Updated last year
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆42Updated 8 months ago
- Simple memory obfuscator.☆24Updated 2 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆23Updated last year
- x64 manual mapper using inline syscalls☆9Updated 4 years ago
- Executing EXE Files From Memory☆12Updated last year
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆9Updated 3 years ago
- Register a callback from a Manually mapped kernel module☆16Updated 3 years ago
- ☆42Updated 3 years ago
- Bypass using kernel driver (not finish).☆21Updated 2 years ago
- anti breakpoint using job objects in a simple way.☆13Updated last year
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆57Updated 9 months ago
- ☆32Updated 3 years ago
- stop any process from looking into your process by hooking.☆21Updated last year
- Helps to find patched modules☆29Updated 4 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆26Updated last year
- Handling C++ & __try exceptions without the need of built-in handlers.☆71Updated 3 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆12Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- ☆53Updated 2 years ago
- C++ console logging library (fmt wrapper)☆17Updated 5 years ago