Umium is a security-focused anti-debugging and anti-reverse engineering library designed for high-resilience Windows applications. It uses a combination of undocumented Windows NT system functions and advanced runtime modifications to detect and neutralize debugging, memory tampering, or sandboxing attempts.
#include "umium.hpp"
int main(void)
{
umium->start();
/* ... */
}
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
Please make sure to update tests as appropriate.
- Donate BTC at `3HGhL4ygYrMMhncpWCGDJg9DbKSndgNiGX`
- Donate ETH at `0x531ea7dcd99bed442a92c985f853dc6892876c40`
- Donate LTC at `LXFmz25B36d3XcergMd4ttCjXPX9FnYTn6`
- Donate TRX at `TExNFUbP8W6eCZqB31AKLSVQFCqDLjYmr9`