C5Hackr / EclipseLinks
A unique introduction to native runtime obfuscation.
☆23Updated 5 months ago
Alternatives and similar repositories for Eclipse
Users that are interested in Eclipse are comparing it to the libraries listed below
Sorting:
- ☆27Updated 10 months ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆33Updated 10 months ago
- ☆46Updated 6 months ago
- codecave hook reverse engineering toolkit.☆37Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- DSE & PG bypass via BYOVD attack☆59Updated last month
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆62Updated 2 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆44Updated 11 months ago
- spoof return address☆75Updated 2 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆159Updated 2 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆29Updated last year
- manual map unsigned driver over signed memory☆200Updated last year
- PoC kernel to usermode injection☆86Updated last year
- Spoof the return address of any function call.☆11Updated last year
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆71Updated 5 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆13Updated 8 months ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆213Updated 4 months ago
- X86 Packer with Portable Executable compatibility.☆56Updated this week
- State of the art DLL injector that took 20 minutes to make☆220Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆48Updated last year
- a always updated and undetected temp spoof driver☆28Updated 5 months ago
- Windows syscall SDK with dynamic offset resolution, validation, obfuscation, and multi language bindings. Bypass API hooks across differe…☆43Updated this week
- Kernel Level NMI Callback Blocker☆117Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆23Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆42Updated 6 months ago
- ☆60Updated last year
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆59Updated 2 years ago
- ☆12Updated 10 months ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago