nickcano / XenoScanLinks
Open source memory scanner written in C++
☆350Updated 4 years ago
Alternatives and similar repositories for XenoScan
Users that are interested in XenoScan are comparing it to the libraries listed below
Sorting:
- ☆243Updated 10 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Updated 6 years ago
- A tool for reconstructing data types based on memory - [Outdated; use ReClassEx]☆124Updated 10 years ago
- A memory scanner plugin for x64dbg, inspired by Cheat Engine.☆305Updated 2 years ago
- Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.☆209Updated 8 years ago
- ReClassEx☆915Updated 4 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆183Updated 11 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆364Updated 10 years ago
- ClassInformer backported for IDA Pro 7.0☆355Updated 5 years ago
- Reverse engineering tool for virtualization wrappers☆143Updated last year
- A collection of x64dbg scripts. Feel free to submit a pull request to add your script.☆530Updated last year
- Universal PatchGuard and Driver Signature Enforcement Disable☆851Updated 6 years ago
- Framework to test any Anti-Cheat☆808Updated 3 years ago
- VMAttack PlugIn for IDA Pro☆846Updated 7 years ago
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆812Updated 4 years ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆248Updated 4 years ago
- 🛡️ Obfuscator, Encryption, Junkcode, Anti-Debug, PE protection/modification☆521Updated 7 years ago
- idenLib - Library Function Identification [This project is not maintained anymore]☆395Updated 6 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,141Updated 6 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆418Updated 5 years ago
- PE permutation library☆277Updated 2 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆220Updated 6 years ago
- RootKit & Cheat Scanner - Windows☆219Updated 6 years ago
- dll injection tool that implements various methods☆497Updated 12 years ago
- Windows x64 Driver Signature Enforcement Overrider☆766Updated 6 years ago
- Literally, the perfect injector.☆945Updated 2 years ago
- xAnalyzer plugin for x64dbg☆1,126Updated 2 weeks ago
- WinDBG Anti-RootKit Extension☆637Updated 5 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆296Updated 4 years ago
- Debugging Framework for Windows.☆1,204Updated 2 weeks ago