liLeiBest / obfuscatorLinks
☆16Updated 5 years ago
Alternatives and similar repositories for obfuscator
Users that are interested in obfuscator are comparing it to the libraries listed below
Sorting:
- A lightweight BattlEye emulator of the launcher☆64Updated 3 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆53Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆130Updated 3 years ago
- PE-Dump-Fixer☆111Updated 5 years ago
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆40Updated 3 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Updated 4 years ago
- Automatic vtable detection, inheritance analysis, and function override tracking for reverse engineering compiled C++ binaries. Supports …☆111Updated last week
- C++11/14 obfuscation techniques.☆43Updated 6 years ago
- External Il2Cpp Framework☆63Updated 4 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 6 years ago
- Various IDA scripts I've created for Reverse engineering.☆96Updated last year
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆85Updated last year
- ☆67Updated 6 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆38Updated 2 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 5 years ago
- fix vmprotect import function used unicorn-engine.☆98Updated 2 years ago
- Vector Exception Handling Hook☆23Updated 9 years ago
- ☆50Updated 6 years ago
- Proof of concept Anti-Cheat plugin.☆57Updated last year
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆105Updated 2 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆118Updated 7 years ago
- ☆50Updated 5 years ago
- single-header pointer/value encryption☆20Updated 2 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆99Updated 3 years ago
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆135Updated 4 years ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆59Updated 2 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆69Updated 6 years ago
- x64 syscall caller in C++.☆93Updated 7 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared u…☆67Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆77Updated 4 years ago