pikulet / anti-debuggingLinks
demo of common anti-analysis techniques used by malware
☆18Updated 4 years ago
Alternatives and similar repositories for anti-debugging
Users that are interested in anti-debugging are comparing it to the libraries listed below
Sorting:
- Simple windows API logger☆109Updated 6 years ago
- Set of antianalysis techniques found in malware☆133Updated 2 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆220Updated 3 years ago
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆64Updated 2 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆154Updated 2 years ago
- Tutorial on solving a VM based CrackMe.☆66Updated 5 years ago
- ntdll.h - compatible with MSVC 6.0, Intel C++ Compiler and MinGW. Serves as a complete replacement for Windows.h☆149Updated 6 years ago
- Inject code into a legitimate process☆146Updated 11 years ago
- ☆58Updated 11 years ago
- Windows Kernel Programming☆133Updated 5 years ago
- An Open Source Windows DLL Injector With All Known Techniques Available☆89Updated 7 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆83Updated 2 years ago
- A DLL that performs IAT hooking☆27Updated 7 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆100Updated 2 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆80Updated 3 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆64Updated 6 years ago
- This project provides a collection of Microsoft Windows kernel structures, unions and enumerations. Most of them are not officially docum…☆233Updated 3 months ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆36Updated 5 years ago
- CallMon is an experimental system call monitoring tool that works on Windows 10 versions 2004+ using PsAltSystemCallHandlers☆145Updated 5 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆105Updated 5 years ago
- Advanced driver monitoring utility.☆218Updated 3 years ago
- PoC for hiding PE exports☆67Updated 5 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 8 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆56Updated 5 years ago
- An automatic tool for fixing dumped PE files☆42Updated 5 years ago
- Three Tiny Examples of Directly Using Vista's NtCreateUserProcess☆89Updated 10 years ago
- Recreation of GetProcAddress without external dependencies on Windows Libraries☆91Updated 10 years ago
- Kernel Detective☆150Updated 3 years ago
- Enumerate user mode shared memory mappings on Windows.☆126Updated 4 years ago