☆30Oct 19, 2024Updated last year
Alternatives and similar repositories for Segment-Encryption
Users that are interested in Segment-Encryption are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11May 5, 2024Updated last year
- ☆12Oct 19, 2024Updated last year
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆34Jun 23, 2024Updated last year
- ☆134Mar 17, 2026Updated last month
- ☆20Jan 8, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A unique introduction to native runtime obfuscation.☆76Mar 2, 2025Updated last year
- Exodus and Atomic crypto wallets app.asar injection POC (captures mnemonic and password) for educational purposes only.☆26Jul 3, 2024Updated last year
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆51Jul 6, 2025Updated 9 months ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- ☆37Nov 8, 2024Updated last year
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 11 months ago
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Near compile-time string obfuscation for Golang☆13Oct 3, 2023Updated 2 years ago
- Reverse engineering malware samples☆16Dec 3, 2021Updated 4 years ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆23Nov 3, 2024Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆77Jun 16, 2025Updated 10 months ago
- HardwareTurningPoint, Fully Go Compatible Hardware Breakpoint☆16Jan 30, 2025Updated last year
- Spoof the return address of any function call.☆11Jul 21, 2024Updated last year
- proper ntdll .text section unhooking via native api. unlike other unhookers this doesnt leave 2 ntdlls loaded. x86/x64/wow64 supported.☆56Dec 9, 2025Updated 4 months ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Implementing an early exception handler for hooking and threadless process injection without relying on VEH or SEH☆139Aug 31, 2025Updated 7 months ago
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆132Nov 17, 2025Updated 5 months ago
- The best powershell obfuscator ever made☆132Aug 1, 2025Updated 8 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- Stealer malware written in C++☆15Sep 7, 2024Updated last year
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆93Sep 14, 2024Updated last year
- This script will able to you to bypass captcha, uam, and bfm challenge of cloudflare☆29Dec 29, 2025Updated 4 months ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Using ioctl major function swaps to "spoof" the ARP table☆15Sep 11, 2024Updated last year
- Indirect Syscall with TartarusGate Approach in Go☆136Jul 8, 2025Updated 9 months ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 8 months ago
- A tool written in golang which compress using UPX and patch it with the provided PE file to make "UPX -d" flag impossible to decompress a…☆31Jan 2, 2025Updated last year