zer0condition / ReverseKitLinks
x64 Dynamic Reverse Engineering Toolkit
☆731Updated 2 years ago
Alternatives and similar repositories for ReverseKit
Users that are interested in ReverseKit are comparing it to the libraries listed below
Sorting:
- protector & obfuscator & code virtualizer☆662Updated this week
- PE (and elf now!) bin2bin obfuscator☆808Updated 3 months ago
- Guided Hacking's official tool to practice bypassing anti-debug techniques.☆312Updated 8 months ago
- x64 binary obfuscator☆1,946Updated 2 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆530Updated 3 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆537Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,263Updated last year
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆561Updated last year
- x64dbg plugin to bypass Themida 3.x Anti-Debugger / VM / Monitoring programs checks (x64)☆548Updated 4 years ago
- Titan is a VMProtect devirtualizer☆116Updated last year
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆807Updated 4 years ago
- A revival of the classic and legendary KsDumper☆548Updated 11 months ago
- HyperDeceit is the ultimate all-in-one library that emulates Hyper-V for Windows, giving you the ability to intercept and manipulate oper…☆377Updated 2 years ago
- VMUnprotect.Dumper can dynamically untamper VMProtected Assembly.☆431Updated 3 years ago
- Manual mapping without creating any threads, with rw only access☆798Updated 6 years ago
- Signtool for expired certificates☆511Updated 2 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆614Updated 4 years ago
- Debugger Anti-Detection Benchmark☆380Updated last week
- A bunch of Windows anti-debugging tricks for x86 and x64.☆804Updated 4 years ago
- Native code virtualizer for x64 binaries☆512Updated last year
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆669Updated 2 years ago
- Inline syscalls made easy for windows on clang☆730Updated last year
- DLL that hooks the NtQuerySystemInformation API and hides a process name☆297Updated 2 years ago
- VMProtect 2.x-3.x x64 Import Deobfuscator☆407Updated 2 months ago
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆946Updated last year
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆321Updated last year
- Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks☆408Updated 6 months ago
- Fumo Loader - All in one kernel-based DLL injector☆359Updated last year
- Hide Process From Task Manager using Usermode API Hooking☆356Updated 4 years ago
- Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes☆339Updated 3 years ago