AimiP02 / BronyaObfusLinks
整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager
☆122Updated last year
Alternatives and similar repositories for BronyaObfus
Users that are interested in BronyaObfus are comparing it to the libraries listed below
Sorting:
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆31Updated 2 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- 大数字驱动逆向代码☆71Updated last year
- IDA Python script for generating Windows x86 shellcode with one click☆37Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆123Updated 6 months ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆104Updated 2 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆74Updated last year
- 使用 Intel 虚拟化特性实现应用层HOOK☆61Updated 4 months ago
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆10Updated 2 months ago
- shellcode生成框架☆86Updated 11 months ago
- ☆120Updated last year
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆71Updated 3 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆68Updated 3 years ago
- Obfuscator-LLVM for LLVM 16.x branch☆214Updated last year
- ☆126Updated last year
- Kotoamatsukami is an obfuscator based on LLVM-17, utilizing LLVM's new pass to implement plug-in features, for obfuscating multiple langu…☆49Updated 2 months ago
- windwos内核研究与驱动Code☆64Updated 3 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- Control Flow Flattening Deobfuscator for Obfuscator-LLVM as a plugin for IDA Pro.☆36Updated 2 months ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆60Updated 2 years ago
- An implementation of an indirect system call☆129Updated last year
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆41Updated 2 years ago
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆14Updated last month
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated this week
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆147Updated 11 months ago
- 复现《EDR的梦魇:Storm-0978使用新型内核注入技术“Step Bear”》☆135Updated 7 months ago
- Windows 常用版本内核文件收集☆10Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago