There are no reviews yet. Be the first to send feedback to the community and the maintainers!
ScyllaHide is an open-source x64/x86 usermode Anti-Anti-Debug library. It hooks various functions in usermode to hide debugging. This will stay usermode! For kernelmode hooks use TitanHide. ScyllaHide is tested to work with VMProtect, Themida, Armadillo, Execryptor, Obsidium If you find any protector that still detects debugger, please tell us. Source code license: GNU General Public License v3 https://www.gnu.org/licenses/gpl-3.0.en.html ------------------------------------------------------ Debugger Hiding: - PEB - BeingDebugged, NtGlobalFlag, Heap Flags - NtSetInformationThread - ThreadHideFromDebugger - NtQuerySystemInformation - SystemKernelDebuggerInformation, SystemProcessInformation - NtQueryInformationProcess - ProcessDebugFlags, ProcessDebugObjectHandle, ProcessDebugPort, ProcessBasicInformation, ProcessBreakOnTermination, ProcessHandleTracing - NtSetInformationProcess - ProcessBreakOnTermination, ProcessHandleTracing - NtQueryObject - ObjectTypesInformation, ObjectTypeInformation - NtYieldExecution - NtSetDebugFilterState - NtUserBuildHwndList - EnumWindows - NtUserFindWindowEx - FindWindowA/W, FindWindowExA/W - NtUserQueryWindow - NtClose - NtCreateThreadEx - BlockInput - Remove Debug Privileges - OutputDebugStringA - OutputDebugStringW Timing Hooks: - GetTickCount - GetTickCount64 - GetLocalTime - GetSystemTime - NtQuerySystemTimeHook - NtQueryPerformanceCounter Special functions: - Prevent Thread creation - for protectors like Execryptor. Only use if you know what you are doing ! - Malware RUNPE Unpacker - Hooks NtResumeThread and terminates + dumps the process created by malware - Kill Anti-Attach Protecting and Stealthing DRx (Hardware Breakpoints): - NtGetContextThread - NtSetContextThread - KiUserExceptionDispatcher (only x86) - NtContinue (only x86) Hooks: - Stealth hooks for 32-bit targets (Tested against Themida/VMProtect) Plugin specific: - Update-Check IDA: - DLL injection (stealth / normal) - IDA 64bit plugin - IDA 32/64bit remote server Olly1&2: - Change Olly title - Resume/Suspend all Threads in Thread window - DLL injection (stealth / normal) Olly1: - Fix PE-Bugs - Fix FPU Bug - x64 compatibility mode - Remove EP-Break - Break on TLS - Skip "EP outside code" message - Advanced CTRL+G - Skip "compressed code" message - Ignore bad PE image (WinUPack) - Skip "Load DLL" message ------------------------------------------------------ Usage standalone (debugger-independent): InjectorCLI.exe <process name> <HookLibrary.dll path> For example: InjectorCLI.exe crackme.exe C:\HookLibrary.dll ------------------------------------------------------ Plugins: - for TitanEngine: Copy HookLibrary.dll and ScyllaHide.dll to plugins\x86\ or plugins\x64\ (can be combined with TitanHide which does kernelmode hiding) - for OllyDbg v1.10: Copy HookLibraryx86.dll and ScyllaHideOlly1.dll to your plugins directory - for OllyDbg v2.01: Copy HookLibraryx86.dll and ScyllaHideOlly2.dll to your plugins directory - for IDA v6 32bit: Copy HookLibraryx86.dll, NtApiCollection.ini, ScyllaHideIDASrvx86.exe and ScyllaHideIDA.plw to your plugins directory - for IDA v6 64bit: Copy ScyllaHideIDA.p64, NtApiCollection.ini, ScyllaHideIDASrvx64.exe and HookLibraryx64.dll to your plugins directory - for x64dbg 32bit: Copy HookLibraryx86.dll, NtApiCollection.ini and ScyllaHideX64DBGPlugin.dp32 to your plugins directory - for x64dbg 64bit: Copy HookLibraryx64.dll, NtApiCollection.ini and ScyllaHideX64DBGPlugin.dp64 to your plugins directory ini Note: The default ini contains settings for this protectors: - VMProtect x86/x64 - Obsidium x86 - Themida x86 - Armadillo x86 Feel free to contribute settings for other protectors! IDA Note: - Start ScyllaHideIDASrvx64.exe to debug 64bit applications - Start ScyllaHideIDASrvx86.exe to debug remotely 32bit applications Commandline: ScyllaHideIDASrvxXX.exe <port> ScyllaHideIDASrv Note: - Server needs HookLibraryxXX.dll and NtApiCollection.ini ------------------------------------------------------ Special thanks to: - What for his POISON Assembler source code https://tuts4you.com/download.php?view.2281 - waliedassar for his blog posts http://waleedassar.blogspot.de - Peter Ferrie for his PDFs http://pferrie.host22.com - MaRKuS-DJM for OllyAdvanced assembler source code - MS Spy++ style Window Finder http://www.codeproject.com/Articles/1698/MS-Spy-style-Window-Finder ------------------------------------------------------ ToDo: - x64 Exception Support ------------------------------------------------------ NOTE: You need to put NtApiCollection.ini in the same directory as ScyllaHide.dll or the following hooks will not work: NtUserQueryWindow, NtUserBuildHwndList, NtUserFindWindowEx Info about NtApiCollection.ini: Some Nt* WINAPI functions are not exported by a DLL, so it is necessary to get the function adresses from another source. The other source is the PDB file. The adresses can be resolved with this tool: https://bitbucket.org/NtQuery/pdb-getprocaddress It will download the PDB file from the Microsoft server to resolve the missing function adresses. Binaries: https://bitbucket.org/NtQuery/scyllahide/downloads/NtApiTool.rar
hexrays_tools
IDA_Signsrch
IDA SignsrchIDA-IDC-Scripts
Varoius IDC-scripts I've collected during the years.idastealth
IDA_ClassInformer
IDA ClassInformer PlugInGUID-Finder
IDASimulator
IDASimulator is a plugin that extends IDA's conditional breakpoint support, making it easy to augment / replace complex executable code inside a debugged process with Python code. Specifically, IDASimulator makes use of conditional breakpoints in the IDA debugger to hijack the execution flow of a process and invoke Python handler functions whenever particular code blocks are executed. With support for multiple target architectures, it handles details such as register initialization, memory allocation, pointers, function arguments and return values seamlessly and transparently, making it easy to replace, modify and subvert existing functionality (or lack thereof) in the target process. IDASimulator also includes the IDASim python module, on which IDASimulator is based. This allows for all of the features of IDASimulator to be integrated into more complex IDAPython scripts. IDASimulator currently supports the x86, x86_64, ARM and MIPS32 architectures. Porting to other architectures is very easy.ida-pro-swf
IDA_FunctionStringAssociate_PlugIn
IDA FunctionStringAssociate PlugInidascope
IDA_COM_Plugin
Fast_IDB2Sig_and_LoadMap_IDA_plugins
optimice
arm-thumb-decompiler-plugin
IDA_Extrapass
IDA ExtraPass PlugInidapathfinder
IndirectCalls
detpdb
desquirr
idatools
Tools for IDAIDAProBoschME7
Siemens Bosch ME7.x Disassembler Helper for IDA Proida-x86emu-QT
bios_parse
PPCAltivec
idaplugs
Plugins for IDA Pro by serviluberstealth
IDA2PAT_Reloaded
turbodiff
CommentViewer
patchdiff3
Continuation of the popular patchdiff IDA pluginRECPP
RECPP is a IDA plugin / API for reversing C++ applications based on Igor Skochinsky articles and scripts (http://www.openrce.org/articles/full_view/21)idastruct
jeb2-plugin-macho
Mach-O Object Plugin for JEB2 https://www.pnfsoftware.comHeapTracer
ida-libbfd-loader
IDA Pro libbfd based loader for misc formats that IDA cannot handle, like IRIX ECOFF etc.bflt-utils
ida-plugins-collection
ida-unicode-string-convert
WhatAPIs
IDA WhatAPIs PlugInida-sync-plugin
ida-pro-plugin-wizard-for-vs2013
StructDump
axis-cris-idp
IDA Pro CPU plugin for the AXIS CRIS architecturearm-helper
IDA-CC
http://forum.exetools.com/showthread.php?t=13569&page=3idainject
binarydiffer
garmin-ida-loader
processstalker
Cypress-M8-IDA-Processor-Module
analyzecore
IDA-omf2pat
IDA FLAIR helpers for making .SIG files from Borland sources by servilIDA-rails
IDA-pinlog
findStrcpy
fujitsu-fr30-idp
IDA Pro CPU plugin for the Fujitsu FR30 architecturecyrplw
findMemcpy
bignum-dumper
findMalloc
get-asm-code
Automated-Generic-Function-Naming
MIPSJT
MIPS JT fixup for IDA PROrsrcExtractor
IdaThingy
ppc2
krypton
gerbay1
ida-dbdump
tree-cbass
ida-x86emu
IDAWinHelpViewer
depload
ppchelper
ida_objectivec_plugins
IDA_MarkRefCnt
IDA MarkRefCount PlugInidaplugininfo
This is a little utility to dump information about installed IDA Pro plugins. The key parts of the IDA PLUGIN export "plugin_t" struct data.REDB
IDA_WaitBoxEx
IDA WaitBoxExCopyAndPast
Binary Copy and Pasteidaocaml
idapatchwork
https://bitbucket.org/daniel_plohmann/idapatchworkncoverage
ida_load_all_dump_load
IDA-auto-declaration
IDA PRO plugin for automatic type declaration like char, byte, float, double wchar etc...vctaxo
malflare
ParseBinTree
take IDA PRO memory lines and print binary tree node.IDACSharp
C# 'Scripts' for IDA 6.6+ based on https://idacsharp.codeplex.com/mynav
wwcd2
Ida pro What Would Capstone Decode by Stefan EsserHotch
rails
ida-vs2005templates
classinformer
https://sourceforge.net/projects/classinformer/ partially adapted for ida64ida_plugin_depack_aplib_and_lzma
CLU
idastruct-1
Script helper in working with ida structuresCOSA-IDA
Comprehensive Static Analyzer For Android Application (COSA with IDA Pro)lltd-osx
LLTD (LLD2D) for OS XLove Open Source and this site? Check out how you can help us