☆32Oct 19, 2024Updated last year
Alternatives and similar repositories for Segment-Encryption
Users that are interested in Segment-Encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12May 5, 2024Updated 2 years ago
- ☆12Oct 19, 2024Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆34Jun 23, 2024Updated last year
- ☆134Mar 17, 2026Updated 2 months ago
- ☆20Jan 8, 2026Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A unique introduction to native runtime obfuscation.☆76Mar 2, 2025Updated last year
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.☆26Jul 3, 2024Updated last year
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆52Jul 6, 2025Updated 10 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- ☆37Nov 8, 2024Updated last year
- kASLR bypass technique on Intel CPUs.☆34May 18, 2025Updated last year
- Backdoor Visual Studio project files with custom shellcode, which executes whenever the project is opened or built.☆48Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆23Nov 3, 2024Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆78Jun 16, 2025Updated 11 months ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆56Dec 9, 2025Updated 5 months ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆140Aug 31, 2025Updated 8 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 6 months ago
- The best powershell obfuscator ever made☆132Aug 1, 2025Updated 9 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Stealer malware written in C++☆14Sep 7, 2024Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆94Sep 14, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This script will able to you to bypass captcha, uam, and bfm challenge of cloudflare☆29Dec 29, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Using ioctl major function swaps to "spoof" the ARP table☆15Sep 11, 2024Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆136Jul 8, 2025Updated 10 months ago
- Privacy-focused CLI swap tool for Monero (XMR). No KYC, no JavaScript, no logs. Swap XMR anonymously via Tor-friendly .onion endpoints.☆14Mar 18, 2025Updated last year
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year