skadro-official / PE-Dump-Fixer
PE-Dump-Fixer
β105Updated 5 years ago
Alternatives and similar repositories for PE-Dump-Fixer:
Users that are interested in PE-Dump-Fixer are comparing it to the libraries listed below
- Attempts to decrypt JM Xorstr in some x64 binariesβ52Updated 2 years ago
- πͺ Different aproaches to detecting EPT hooksβ102Updated 2 years ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheatβ69Updated 2 years ago
- unorthodox approach to analyze a trace, but this helped me get comfy with x64 instructions overall (excluding sse/avx/etc lol), cleared uβ¦β57Updated last year
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.β142Updated 3 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.β69Updated 3 years ago
- A lightweight BattlEye emulator of the launcherβ60Updated 2 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.β79Updated 4 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.β111Updated 3 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.β123Updated 2 years ago
- A devirtualization engine for Themida.β97Updated last year
- A simple ida python script to find .data ptrβ50Updated last year
- KDM Is a driver that will dumps every drivers that got manually mapped with kdmapper.β53Updated 2 years ago
- β73Updated 11 months ago
- Ghetto user mode emulation of Windows kernel drivers.β132Updated 5 months ago
- Enable SEH support for manual mapped x86-32bit PEsβ66Updated 6 years ago
- Kernel driver for detecting Intel VT-x hypervisors.β178Updated last year
- Kernel driver that uses Shared memory to communicate with UserModeβ85Updated 5 years ago
- Kernel Lazy Importerβ109Updated 11 months ago
- Disks for DMAβ104Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisyβ82Updated 4 years ago
- manually map driver for a signed driver memory spaceβ151Updated 4 years ago
- Kernel ReClassExβ65Updated last year
- β78Updated 2 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and preβ¦β52Updated 2 years ago
- β50Updated 4 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallbackβ69Updated 5 years ago
- Old project (2020) reformed. Modifies gRT->GetVariable sub function from EFI_APPLICATION. Tested on Win10 22H2 (AMD).β50Updated last year
- Virtual and physical memory hacking library using gigabyte vulnerable driverβ71Updated last year
- Discarded Section Manual Mapβ65Updated 4 years ago