Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
-
Updated
Jun 4, 2024 - C++
Advanced usermode anti-anti-debugger. Forked from https://bitbucket.org/NtQuery/scyllahide
Hypervisor based anti anti debug plugin for x64dbg
Guided Hacking's official tool to practice bypassing anti-debug techniques.
ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Using ReadDirectoryChangesW to detect CheatEngine
Do integer arithmetic with fsub.
SysWhispers/DirectSyscall Successor - Advanced Direct Syscall Invocation framework using modern techniques - EDR/XDR/AntiCheat Evasion Framework Win64
Old 32 bit PE executable protector / crypter
blocks debuggers from suspending your programs threads
Anti-debugging techniques on a (bad looking) Win32 application.
manipulates your files process information to prevent debuggers from attaching
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
SecLib is a simple header-only library that checks all running processes for certain identifiers.
WinRasp is a RASP(Runtime Application Slef Protection) solution for Windows. It can help customer to detect and remove the threats while the target application is at runtime. It can be used to protect registry, file, and process object.
Simple .cpp file to protect the program from a debugger
C++ CrackME Code
A demonstration of secure memory section creation and mapping using Windows native APIs, with integrity checks and safe memory modifications.
Add a description, image, and links to the anti-debug topic page so that developers can more easily learn about it.
To associate your repository with the anti-debug topic, visit your repo's landing page and select "manage topics."