Pinned Repositories
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Anti-Hook-
Blackbone
Windows memory hacking library
CallObfuscator
Obfuscate specific windows apis with different apis
cpp-httplib
C++11 header-only HTTP/HTTPS sever library
Injectora
x86/x64 manual mapping injector using the JUCE library
REM
Protected process memory access.
TF2Base-2012
UnrealEngineSDKGenerator
Generate SDKs from Unreal Engine games (UE1 - 4 supported).
UnrealEngineSDKGenerator-1
Generate SDKs from Unreal Engine games (UE1 - 4 supported).
uItra's Repositories
uItra/Injectora
x86/x64 manual mapping injector using the JUCE library
uItra/REM
Protected process memory access.
uItra/UnrealEngineSDKGenerator
Generate SDKs from Unreal Engine games (UE1 - 4 supported).
uItra/UnrealEngineSDKGenerator-1
Generate SDKs from Unreal Engine games (UE1 - 4 supported).
uItra/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
uItra/Blackbone
Windows memory hacking library
uItra/CallObfuscator
Obfuscate specific windows apis with different apis
uItra/cpp-httplib
C++11 header-only HTTP/HTTPS sever library
uItra/DriverBuddy
DriverBuddy is an IDA Python script to assist with the reverse engineering of Windows kernel drivers.
uItra/TF2Base-2012
uItra/Driverless_Driver-Hacking
A driverless driver that is supposed to be manually mapped, usually by using TDL exploit. The driver shows how to read/write to any process memory and some other useful functions.
uItra/FastTrigo
Fast yet accurate trigonometric functions
uItra/HandleMaster
Changes handle's access rights using DKOM with a vulnerable driver
uItra/hidden
Windows driver and usermode interface which can hide objects of file-system and registry, protect processes and etc
uItra/MIR-Engine
MIR-Engine
uItra/Overwatch-IAT-Deobfuscation
this plugin adds the 'oiu' command to x64dbg. the command locates the memory region containing Overwatch's import address table, deobfuscates all import entries, and labels each import's thunk address.
uItra/PolyHook
x86/x64 C++ Hooking Library
uItra/qt
Our build of qt, which is based on Valve's build of qt
uItra/ReClass.NET
A ReClass port to the .NET platform.
uItra/ReClass.NET-HandleAbuser
A ReClass.NET plugin which uses the process handles of an other process to access the data of the target.
uItra/ReClass.NET-MemoryPipePlugin
A ReClass.NET plugin which allows direct memory access via dll injection.
uItra/rift-explorer
🛠 Explore the API of the League of Legends client
uItra/Self-Remapping-Code
This program remaps its image to prevent its .text and .rdata PE sections from being made writable via NtProtectVirtualMemory.
uItra/Shark
Turn off PatchGuard in real time for win7 (7600) ~ win10 (17763).
uItra/Source2Gen
Source 2 SDK Generator
uItra/SpeedFan-Exploit
Abusing SpeedFan driver ability of physical memory manipulation
uItra/ThreadJect
Manual DLL Injector using Thread Hijacking.
uItra/vs-obfuscation
LLVM Obfuscator / constexpr / PEB CALL API
uItra/Windbg2Struct
Takes a Windbg dumped structure (using the 'dt' command) and formats it into a C structure
uItra/Xenos
Windows dll injector