BroOfBros / C-Cpp-Macro-EncryptionLinks
Using macros in order to encrypt strings during compilation time.
☆15Updated 6 years ago
Alternatives and similar repositories for C-Cpp-Macro-Encryption
Users that are interested in C-Cpp-Macro-Encryption are comparing it to the libraries listed below
Sorting:
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- Мутация PE x86☆15Updated 6 years ago
- ☆59Updated 3 years ago
- Скрытие Win API☆27Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆69Updated 3 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- exploit termdd.sys(support kb4499175)☆59Updated 6 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 4 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Manual PE image mapper☆65Updated 11 years ago
- Just an example of a well-known technique to detect memory tampering via Windows Working Sets.☆16Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- Use NtSetInformationThread(ThreadBreakOnTermination) for anti-debugging☆12Updated 5 years ago
- too busy for that all, furikuri is framework for code protection☆160Updated 5 years ago
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆67Updated last year
- Rootkit & Anti-rootkit☆39Updated last year
- Bypassing code hooks detection in modern anti-rootkits via building faked PTE entries.☆79Updated 14 years ago
- r0akmap is a PoC driver manual mapper based on r0ak☆39Updated 6 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- Plugins related to LeechCore☆37Updated last month
- A C++ syscall ID extractor for Windows. Developed, debugged and tested on 20H2.☆20Updated 4 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- C++ 17 compile time string encryption supporting vs2010-2019☆75Updated 5 years ago
- LSASS INJECTOR☆35Updated 6 years ago