invictus1306 / Anti-debugging-techniquesLinks
Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.
☆34Updated 9 years ago
Alternatives and similar repositories for Anti-debugging-techniques
Users that are interested in Anti-debugging-techniques are comparing it to the libraries listed below
Sorting:
- A simple tool to view important DLL Characteristics and change DEP and ASLR☆44Updated 6 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Updated 4 years ago
- Archive of ransomware decryptors☆31Updated 7 years ago
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Updated 7 years ago
- A simple API monitor for Windbg☆63Updated 8 years ago
- DLL Injection Library & Tools☆71Updated 9 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆20Updated 7 years ago
- Simple 32/64-bit PEs loader.☆139Updated 6 years ago
- Load a Windows Kernel Driver☆93Updated 8 years ago
- IDA script for vmprotect Windows Api address decoder☆51Updated 4 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆66Updated 3 years ago
- A collection of anti disassembly techniques☆19Updated 8 years ago
- My collection of unpackers for malware packers/crypters☆28Updated 8 years ago
- ☆34Updated 4 years ago
- Flare-On solutions☆36Updated 5 years ago
- Crackmes Keygenmes Serialmes y más☆42Updated 2 years ago
- ☆22Updated 5 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- PoC for detecting and dumping process hollowing code injection☆52Updated 6 years ago
- Analyze and attack windows applications using dll hijacking vulnerabilities☆58Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- ☆50Updated 8 years ago
- Adding exceptions to Microsoft's Control Flow Guard (CFG)☆58Updated 9 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆39Updated 9 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 4 years ago
- ☆22Updated 4 years ago
- POC viruses I have created to demo some ideas☆59Updated 5 years ago
- Windbg2ida lets you dump each step in Windbg then shows these steps in IDA☆75Updated last year