hovewoof / My-Simple-CrackmeLinks
This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.
☆14Updated 2 years ago
Alternatives and similar repositories for My-Simple-Crackme
Users that are interested in My-Simple-Crackme are comparing it to the libraries listed below
Sorting:
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- PAGE_GUARD based hooking library☆52Updated 3 years ago
- ☆12Updated 6 years ago
- POC kernel driver with hidden system thread☆13Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆48Updated 4 months ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆20Updated 3 years ago
- Passthrough anti-cheat with this kernel-driver based on guided hacking tutorial☆11Updated 4 years ago
- RWX Section Abusing☆16Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 4 years ago
- Executing EXE Files From Memory☆11Updated 2 years ago
- Register a callback from a Manually mapped kernel module☆15Updated 4 years ago
- Simple memory obfuscator.☆24Updated 3 years ago
- UM-KM Communication using registry callbacks☆39Updated 5 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆14Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71Updated 3 years ago
- communicate with kernel using a image on disk☆16Updated last year
- Single header code that sets any section's page to No Access☆11Updated 3 years ago
- Fixes the "Device\Nal is already in use" error on kdmapper.☆19Updated 3 years ago
- simple driver to read and write☆17Updated 9 months ago
- read / write memory from a proxy process by injecting shellcode☆20Updated last month
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- A simple present scene, kernel allocation injector.☆26Updated 3 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆62Updated 3 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Updated 4 years ago
- ☆43Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆56Updated 2 years ago
- ☆70Updated 4 years ago
- ☆47Updated 3 years ago
- Simple handler for bypass battleye in 5 seconds☆11Updated 4 years ago