zer0mem / HowToBoostPatchGuardLinks
more at http://www.zer0mem.sk/?p=271
☆12Updated 12 years ago
Alternatives and similar repositories for HowToBoostPatchGuard
Users that are interested in HowToBoostPatchGuard are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- PE Infector/Cryptor source code☆16Updated 8 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Updated 9 years ago
- A library that allows hook any imported function from the IAT (works only in x64)☆11Updated 6 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Updated 9 years ago
- ☆13Updated 4 years ago
- ☆16Updated 9 years ago
- ☆12Updated 8 years ago
- Confirms the capability of Hardware-Accelerated Virtualization Technology.☆10Updated last week
- ☆14Updated 8 years ago
- ☆14Updated 10 years ago
- Windows device tree walker☆15Updated 7 years ago
- windows kernel File redirection☆20Updated 11 years ago
- Lists work items being queued currently.☆14Updated 10 years ago
- an efficient yet easy to use network packet builder and parser☆11Updated 8 years ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Updated 7 years ago
- pass game protect☆12Updated 11 years ago
- ShellcodeVM☆15Updated 9 years ago
- ☆19Updated 10 years ago
- ☆14Updated 8 years ago
- Demos presented on Hackerfest 2015☆14Updated 9 years ago
- ☆14Updated 8 years ago
- ☆12Updated 8 years ago
- An analytical debugger programmed in C++, using Qt.☆21Updated 13 years ago
- Windows Kernel Mode PCRE☆10Updated 10 years ago
- Example library for how to dynamically/statically hook/intercept unmanaged functions and APIs☆13Updated 2 years ago
- WoW64 -> x64☆19Updated 9 years ago
- ☆15Updated 8 years ago
- a method for undetectable breakpoints in 32-bit Windows programs☆13Updated 11 years ago