AimiP02 / BronyaObfusLinks
整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager
☆127Updated last year
Alternatives and similar repositories for BronyaObfus
Users that are interested in BronyaObfus are comparing it to the libraries listed below
Sorting:
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆31Updated 2 years ago
- 大数字驱动逆向代码☆71Updated last year
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆78Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆60Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆71Updated 3 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated 2 years ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆153Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- shellcode生成框架☆88Updated last year
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- windwos内核研究与驱动Code☆65Updated 3 years ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆20Updated last month
- An implementation of an indirect system call☆129Updated last year
- ☆32Updated last year
- about how to make a anti-virus engine☆77Updated 2 months ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- Kill Protected Process Light Process (include av)☆58Updated last year
- X86 Packer with Portable Executable compatibility.☆53Updated 3 weeks ago
- Windows API Call Obfuscation☆109Updated 2 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 5 months ago
- ☆133Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆126Updated 7 months ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated last month
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆33Updated 2 weeks ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆72Updated 3 years ago
- Detect BypassUAC using AMSI☆26Updated 5 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆30Updated 3 months ago
- ksc4cpp is a shellcode framework for windows kernel based on C++☆21Updated 2 years ago