☆248Oct 6, 2014Updated 11 years ago
Alternatives and similar repositories for ScyllaHide
Users that are interested in ScyllaHide are comparing it to the libraries listed below
Sorting:
- Windows kernel-mode callbacks tutorial driver☆48Aug 8, 2016Updated 9 years ago
- Detecting execution of kernel memory where is not backed by any image file☆261Jul 11, 2018Updated 7 years ago
- Collection Of Anti-Debugging Tricks☆100Dec 19, 2015Updated 10 years ago
- ☆117Nov 11, 2012Updated 13 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆183Nov 30, 2017Updated 8 years ago
- WinDBG Anti-RootKit Extension☆645Jul 29, 2020Updated 5 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Debugger extension for the Debugging Tools for Windows (WinDbg, KD, CDB, NTSD).☆69Nov 14, 2016Updated 9 years ago
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Jan 24, 2011Updated 15 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Test code only. Not suitable for actual use.☆96Apr 19, 2015Updated 10 years ago
- Hiding kernel-driver for x86/x64.☆2,619Sep 2, 2025Updated 6 months ago
- Hypervisor based tool for monitoring system register accesses.☆154Sep 13, 2018Updated 7 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Examples for detection of hidden processes on windows☆35Jun 11, 2014Updated 11 years ago
- A plugin for x64dbg for x86 emulation powered by the Unicorn-engine.☆29Dec 9, 2015Updated 10 years ago
- InjectProc - Process Injection Techniques [This project is not maintained anymore]☆998Feb 10, 2019Updated 7 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆327Apr 26, 2017Updated 8 years ago
- VMAttack PlugIn for IDA Pro☆866Nov 30, 2017Updated 8 years ago
- Examples of leaking Kernel Mode information from User Mode on Windows☆634Jul 7, 2017Updated 8 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- ☆408Mar 1, 2017Updated 9 years ago
- An analytical debugger programmed in C++, using Qt.☆22May 20, 2012Updated 13 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Mar 17, 2019Updated 6 years ago
- x86/x64 C++ Hooking Library☆925Jun 25, 2020Updated 5 years ago
- Imports Reconstructor☆1,329Apr 5, 2023Updated 2 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆1,002Jan 17, 2023Updated 3 years ago
- Program to monitor Windows event (keyboard, mouse event, processes, memory, cpu, ...)☆34Nov 10, 2014Updated 11 years ago
- User-mode hook bypassing method☆33Aug 26, 2016Updated 9 years ago
- Incident Response & Digital Forensics Debugging Extension☆391Dec 11, 2018Updated 7 years ago
- ☆12Feb 19, 2017Updated 9 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Feb 15, 2017Updated 9 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆367Mar 15, 2015Updated 10 years ago