yubie-re / vmp-virtualprotect-bypassLinks
Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.
☆126Updated 3 years ago
Alternatives and similar repositories for vmp-virtualprotect-bypass
Users that are interested in vmp-virtualprotect-bypass are comparing it to the libraries listed below
Sorting:
- External Il2Cpp Framework☆60Updated 3 years ago
- Various IDA scripts I've created for Reverse engineering.☆85Updated 7 months ago
- VMProtect, VMP, Devirter, 3,5☆107Updated 2 years ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆62Updated last year
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago
- Kernel Lazy Importer☆114Updated last year
- manually map driver for a signed driver memory space☆157Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- bypass vmp virtual machine detect☆132Updated 2 years ago
- x64 Windows kernel driver mapper, inject unsigned driver using anycall☆159Updated last year
- DWM Overlay without write .text☆85Updated 8 months ago
- This is a repo of my previous BEKernelDriver but updated to add better protections and a more detailed setup. also with a good bit of cod…☆98Updated 8 months ago
- undetected eac mapper☆165Updated 3 years ago
- ☆75Updated last year
- VMP Mutation API Fix☆41Updated 3 years ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆156Updated 2 years ago
- Kernel anticheat to test your driver against☆155Updated 3 months ago
- Reverse Engineering a signed kernel driver packed and virtualized with VMProtect 3.6☆102Updated 2 years ago
- x64/x86 Hooking through VectoredExceptionHandler (PAGE_GUARD method)☆53Updated last year
- Using CVE-2021-40449 to manual map kernel mode driver☆101Updated 3 years ago
- Based on physmeme☆69Updated 3 years ago
- PE-Dump-Fixer☆105Updated 5 years ago
- Kernel driver that .text hooks a syscall in dxgkrnl.sys which can be called from our user-mode client to send instructions like rpm/wpm a…☆177Updated 2 years ago
- ☆141Updated last year
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆124Updated 3 years ago
- Drawing from kernelmode without any hooks☆162Updated 2 years ago
- The windows kernel debugger consists of two parts, KMOD which is the kernel driver handling ring3 request and KCLI, the command line inte…☆94Updated 2 years ago
- BattlEye kernel module bypass☆169Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago