Templated Obfuscation example in C++ for protecting/hiding values in memory
☆41Feb 1, 2025Updated last year
Alternatives and similar repositories for ObfuscateThis
Users that are interested in ObfuscateThis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆42Oct 19, 2023Updated 2 years ago
- A compilation-time AoB pattern scanning library☆12Aug 27, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 5 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆39Sep 23, 2023Updated 2 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- A lightning-fast memory pattern scanner, capable of scanning gigabytes of data per second.☆42Feb 25, 2025Updated last year
- ☆35Nov 16, 2023Updated 2 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Terminate AV/EDR leveraging BYOVD attack☆103Mar 21, 2025Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Duplicate not owned Token from Running Process☆73Jul 21, 2023Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆24Nov 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆250Jul 9, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 4 months ago
- ImGui Cheat Base with DirectX, this source also have Cyber Hunter cheat in their code.☆18Jun 9, 2021Updated 4 years ago
- Create Anti-Copy DRM Malware