CrackerCat / CallObfuscator
Obfuscate specific windows apis with different apis
☆12Updated 6 months ago
Alternatives and similar repositories for CallObfuscator:
Users that are interested in CallObfuscator are comparing it to the libraries listed below
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Process Hollowing Packer☆26Updated 7 years ago
- ☆12Updated 3 years ago
- ☆19Updated 9 years ago
- 从admin冲到TrustedInstaller☆17Updated 2 years ago
- Files for http://deniable.org/windows/windows-callbacks☆24Updated 4 years ago
- May the POC be with you☆53Updated last month
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- 非涉密源码☆19Updated 11 months ago
- defender_database☆16Updated last year
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- ☆48Updated last year
- Inject unsigned DLL into Protected Process Light (PPL)☆18Updated 2 months ago
- ☆35Updated 5 years ago
- POC For CVE-2022-24483☆14Updated 2 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- Enumerate the DLLs/Modules using NtQueryVirtualMemory☆32Updated 9 years ago
- A tool is used to infected a shellcode to PE file, the shellcode is packed at compile time and unpacked at runtime☆13Updated 4 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- 感染PE文件的病毒学习过程☆31Updated 4 years ago
- exploit termdd.sys(support kb4499175)☆58Updated 5 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆14Updated 2 years ago
- Linux shellcode code memory injection library .so .dll injection without ptrace example PoC☆23Updated 3 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆31Updated 4 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆31Updated 2 years ago
- A quick tool for hiding a new process running shellcode.☆57Updated 4 years ago
- Kernel file/process/object tool☆64Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆41Updated 2 years ago
- PE file mapping and manipulation package.☆36Updated 2 years ago