AimiP02 / BronyaObfus
整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager
☆119Updated last year
Alternatives and similar repositories for BronyaObfus:
Users that are interested in BronyaObfus are comparing it to the libraries listed below
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆30Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆104Updated 2 months ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆60Updated 2 months ago
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆38Updated 2 years ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆104Updated 7 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆66Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆56Updated 2 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆81Updated 2 years ago
- IDA Python script for generating Windows x86 shellcode with one click☆36Updated last year
- An implementation of an indirect system call☆119Updated last year
- 大数字驱动逆向代码☆71Updated last year
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆87Updated 2 weeks ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆69Updated 3 years ago
- shellcode生成框架☆83Updated 7 months ago
- 一个用来做windows内核hook的框架☆83Updated 10 months ago
- ☆122Updated last year
- Magical obfuscator, supports obfuscating EXE, BOF, and ShellCode.☆142Updated 2 months ago
- Example of reading process memory through kernel special APC☆101Updated last year
- Windows API Call Obfuscation☆99Updated 2 years ago
- ☆114Updated last year
- ☆27Updated last year
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆109Updated last year
- Obfuscator-LLVM for LLVM 16.x branch☆194Updated last year
- shellcode-loaders and beacon-loaders☆64Updated last year
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆122Updated 3 months ago
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- ☆26Updated last year
- Load static-compiled PE from remote server.☆59Updated 3 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆55Updated last month
- 跨平台模拟执行unicorn框架基于Qemu的TCG模式(Tiny Code Generator),以无硬件虚拟化支持方式实现全系统的虚拟化,支持跨平台和架构的CPU指令模拟,本文讨论是一款笔者的实验性项目采用Windows Hypervisor Platform虚拟机模式…☆65Updated last year