x64dbg / AutoExportPatchesLinks
Plugin that automatically stores patches in the database and restores them on restart.
☆31Updated last year
Alternatives and similar repositories for AutoExportPatches
Users that are interested in AutoExportPatches are comparing it to the libraries listed below
Sorting:
- A simple open source module injector library x86/x64 for Windows☆21Updated 5 years ago
- x64dbg plugin - AttachHelper☆21Updated 8 years ago
- A simple open source memory hooking library for Windows x86/x64☆87Updated 4 years ago
- Noninvasive debugging plugin for X64Dbg☆106Updated 9 months ago
- fix vmprotect import function used unicorn-engine.☆96Updated 2 years ago
- Fork of Scylla with additional fixes and Python bindings.☆51Updated last year
- Global DLL injector☆68Updated 4 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆50Updated 3 years ago
- A bunch of architectural headers for i386 and AMD64☆41Updated last year
- x64dbg plugin for simple spoofing of CPUID instruction behavior☆91Updated 2 years ago
- Pointer search for any classes using the RTTI feature.☆49Updated 5 years ago
- VMP Mutation API Fix☆43Updated 3 years ago
- A plugin to x64dbg that lets you find out what writes to/accesses particular address☆115Updated 4 years ago
- An x64dbg plugin that allows users to execute Cheat Engine auto assembler scripts within x64dbg.☆75Updated 7 years ago
- Plugin manager plugin for x64dbg.☆50Updated 3 weeks ago
- ☆50Updated 6 years ago
- paste string formatted byte data block into x64dbg easy.☆41Updated 4 years ago
- This is just a x64dbg script system support.☆47Updated 3 years ago
- PE-Dump-Fixer☆110Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆105Updated 4 years ago
- This x64dbg plugin adds several commands for dumping PE header information by address.☆63Updated 8 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆118Updated 8 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆70Updated 2 years ago
- Detours lib that I use☆85Updated 3 years ago
- disable most common windowsx64 systems patchguard☆88Updated 6 years ago
- Detect if a mouse event injected☆39Updated 8 years ago
- 🔎 Analysis of Oreans: Looking inside Themida, WinLicense, and CodeVirtualizer☆35Updated 5 years ago
- x64 syscall caller in C++.☆89Updated 7 years ago
- Standalone program to download PDB Symbol files for debugging without WDK☆79Updated 6 years ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 6 years ago