hovewoof / My-Simple-CrackmeLinks
This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.
☆15Updated last year
Alternatives and similar repositories for My-Simple-Crackme
Users that are interested in My-Simple-Crackme are comparing it to the libraries listed below
Sorting:
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆36Updated 7 months ago
- a simple obfuscator☆1Updated last year
- POC kernel driver with hidden system thread☆14Updated last year
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆21Updated last year
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- RWX Section Abusing☆17Updated last year
- Detect suspend you process☆12Updated 2 years ago
- ☆12Updated last year
- ☆14Updated 4 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- Old way for blocking NMI interrupts☆26Updated 2 years ago
- communicate with kernel using a image on disk☆15Updated last year
- Stealing signatures from pe files☆17Updated 2 months ago
- Simple memory obfuscator.☆24Updated 2 years ago
- Modern x64 anti-debug library☆9Updated 5 years ago
- Executing EXE Files From Memory☆12Updated last year
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- ☆25Updated last year
- A dumper for all the imports stored within a Windows PE (portable executable).☆15Updated 3 years ago
- ☆30Updated 3 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago
- Single header code that sets any section's page to No Access☆12Updated 3 years ago
- Freeze target threads (external - internal ) by avoiding SuspendThread detections. Or access registers from start address.☆32Updated last year
- Bypass using kernel driver (not finish).☆20Updated 2 years ago
- Execute anything in a legit memory region by attacking a windows driver☆19Updated last year
- Disable NMI Callbacks with Kernelmode Driver☆19Updated 2 years ago
- Written in a couple hours, don't judge :)☆15Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago