wanttobeno / AntiDebuggers
30种方法检测程序是否被调试
☆328Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for AntiDebuggers
- Windows Ark 工具的工程和一些demo☆185Updated 8 years ago
- Some ways to inject a DLL into a alive process☆353Updated 6 years ago
- pseudo-code to show how to disable patchguard with win10☆295Updated 6 years ago
- VMProtect 3.x Anti-debug Method Improved☆522Updated 5 years ago
- windows pe packing☆109Updated last year
- open-source x86/x64 usermode anti-anti-debug plugin☆215Updated 4 years ago
- Kernel Anit Anit Debug Plugins 内核反反调试插件☆449Updated 3 years ago
- Radical Windows ARK☆206Updated 2 weeks ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆536Updated 8 months ago
- Hide Driver By MiProcessLoaderEntry☆281Updated 5 years ago
- kernel-mode Anti-Anti-Debug plugin. based on intel vt-x && ept technology☆429Updated 4 years ago
- win32下的虚拟机保护壳☆136Updated 9 years ago
- A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.☆172Updated last month
- A collection of injection via vc++ in ring3☆239Updated 7 years ago
- InfinityHookPro Win7 -> Win11 latest☆496Updated last year
- The Universal C++ RunTime library, supporting kernel-mode C++ exception-handler and STL.☆399Updated 4 months ago
- ☆135Updated 5 years ago
- ☆151Updated 4 years ago
- 同时支持用户和内核模式的Inlinehook库☆120Updated 6 years ago
- ☆126Updated 4 years ago
- ☆77Updated 3 years ago
- Fix VMProtect3 IAT☆260Updated 11 months ago
- Fast Conversion Windows Dynamic Link Library To ShellCode☆379Updated 2 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆787Updated 6 months ago
- modify from memorymodule. support exception☆211Updated 4 years ago
- ☆116Updated 6 years ago
- ☆91Updated 3 years ago
- 逆向火绒安全软件驱动——sysdiag☆149Updated 6 years ago
- LLVM Obfuscator / constexpr / PEB CALL API☆172Updated 5 years ago