hovewoof / My-Simple-CrackmeLinks
This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.
☆14Updated 2 years ago
Alternatives and similar repositories for My-Simple-Crackme
Users that are interested in My-Simple-Crackme are comparing it to the libraries listed below
Sorting:
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
 - PAGE_GUARD based hooking library☆52Updated 3 years ago
 - Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆18Updated 3 years ago
 - Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆46Updated last month
 - Stealing signatures from pe files☆14Updated 7 months ago
 - Executing EXE Files From Memory☆11Updated 2 years ago
 - Single header code that sets any section's page to No Access☆11Updated 3 years ago
 - ☆11Updated 6 years ago
 - search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 4 years ago
 - POC kernel driver with hidden system thread☆13Updated last year
 - A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
 - Bypass using kernel driver (not finish).☆20Updated 2 years ago
 - Mapping your code on a 0x1000 size page☆72Updated 3 years ago
 - ☆51Updated 5 years ago
 - ☆35Updated 3 years ago
 - Simple memory obfuscator.☆24Updated 3 years ago
 - Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
 - PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 3 years ago
 - Virtual and physical memory hacking library using gigabyte vulnerable driver☆70Updated 2 years ago
 - ☆47Updated 3 years ago
 - Microsoft Redistributable Download & Installer☆17Updated 6 years ago
 - A wrapper class to hide the original calling address of a function☆56Updated 5 years ago
 - Illustrates the concept of return address spoofing, and how it is used.☆14Updated 5 years ago
 - ☆42Updated 2 years ago
 - UM-KM Communication using registry callbacks☆40Updated 5 years ago
 - hidden_syscall - syscaller without using syscall instruction in code☆62Updated 2 years ago
 - ☆16Updated 3 years ago
 - Handling C++ & __try exceptions without the need of built-in handlers.☆73Updated 4 years ago
 - Header only UM AC "bypass"☆19Updated last year
 - Register a callback from a Manually mapped kernel module☆16Updated 3 years ago