AlSch092 / ObfuscateThis
Templated Obfuscation example in C++ for protecting/hiding values in memory
☆32Updated 2 weeks ago
Alternatives and similar repositories for ObfuscateThis:
Users that are interested in ObfuscateThis are comparing it to the libraries listed below
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆48Updated 6 months ago
- ☆36Updated this week
- Example of building an application verifer DLL☆44Updated 8 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆22Updated 7 months ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- ☆106Updated 2 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)☆17Updated 8 months ago
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- ☆29Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- ☆12Updated 2 years ago
- ☆21Updated 9 months ago
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated last year
- SetWinEventHook Sample☆46Updated last year
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆26Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆24Updated 8 months ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆114Updated last year
- Exploiting the KsecDD Windows driver through Server Silos☆50Updated 3 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆26Updated 6 months ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 8 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 7 months ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆16Updated 6 months ago
- In-memory hiding technique☆45Updated last month
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆62Updated last year