A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code sections, enhancing runtime protection against static and dynamic analysis.
☆50Nov 3, 2025Updated 4 months ago
Alternatives and similar repositories for JitDecrypter
Users that are interested in JitDecrypter are comparing it to the libraries listed below
Sorting:
- binary instrumentation, analysis, and patching framework☆100Feb 20, 2026Updated last week
- An example of how to use Microsoft Windows Warbird technology☆96Apr 23, 2023Updated 2 years ago
- A simple memory dumper☆12Feb 11, 2020Updated 6 years ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 3 months ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆72May 6, 2025Updated 9 months ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Oct 10, 2016Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 4 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 4 months ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆237Oct 11, 2025Updated 4 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆303Nov 20, 2025Updated 3 months ago
- Fast service fingerprinting CLI for 120+ protocols (TCP/UDP/SCTP) - built by Praetorian☆100Updated this week
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆40Jul 29, 2025Updated 7 months ago
- Obex – Blocking unwanted DLLs in user mode☆282Sep 18, 2025Updated 5 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Virtual Trust Level (VTL 1) secure call tracing☆103Feb 12, 2026Updated 2 weeks ago
- ☆61Oct 24, 2025Updated 4 months ago
- ☆48Nov 26, 2025Updated 3 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆270Jun 18, 2025Updated 8 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- Rust bindings for VMProtect.☆28Mar 8, 2024Updated last year
- ☆24Oct 30, 2024Updated last year
- Lateral Movement Bof with MSI ODBC Driver Install☆145Sep 30, 2025Updated 5 months ago
- Kernel and Usermode Spoofer for SCP:SL☆62Mar 23, 2024Updated last year
- Optimized zlib inflate (+gzip) library for embedded☆40Jul 15, 2024Updated last year
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆57Jan 17, 2026Updated last month
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Mar 14, 2017Updated 8 years ago
- ☆121Dec 23, 2022Updated 3 years ago
- A PoC~ish of https://elastic.github.io/security-research/malware/2022/01/01.operation-bleeding-bear/article/☆31Feb 26, 2024Updated 2 years ago
- Охотник (Hunter) is a simple Adversary Simulation tool developed for achieves stealth through API unhooking, direct and indirect syscalls…☆93Apr 23, 2025Updated 10 months ago
- Proteus is an anti-reverse engineering system that provides protection from disassembly and debugging for software written in Java and C/…☆26May 12, 2016Updated 9 years ago
- Block Windows Defender by deny ACL☆77Jan 12, 2026Updated last month
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago