ScyllaHide | source x64/x86 usermode Anti | Code Inspection library
kandi X-RAY | ScyllaHide Summary
kandi X-RAY | ScyllaHide Summary
ScyllaHide is an open-source x64/x86 usermode Anti-Anti-Debug library. It hooks various functions in usermode to hide debugging. This will stay usermode! For kernelmode hooks use TitanHide. ScyllaHide is tested to work with VMProtect, Themida, Armadillo, Execryptor, Obsidium If you find any protector that still detects debugger, please tell us. Source code license: GNU General Public License v3
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ScyllaHide
ScyllaHide Key Features
ScyllaHide Examples and Code Snippets
Community Discussions
Trending Discussions on ScyllaHide
QUESTION
I have a 64bit process, I figured out one of its statically linked library methods.
Source of this method:
...ANSWER
Answered 2020-Nov-26 at 16:39If you can find out the address of the SSL_connect function you can detour
it. This means that you can write a JMP
instruction at the begin of the method to your patched
-method.
If your jumped-to
method has the same calling convention and signature you can simply access SSL* and do what you want with it afterwards you can jump back...
To let the jump back work you would need to restore the org code or create a copy of the org method...
Another way would be a Hardware-Break-Point: read for example here.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install ScyllaHide
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page