A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code sections, enhancing runtime protection against static and dynamic analysis.
☆54Nov 3, 2025Updated 5 months ago
Alternatives and similar repositories for JitDecrypter
Users that are interested in JitDecrypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple memory dumper☆13Feb 11, 2020Updated 6 years ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆73May 6, 2025Updated 11 months ago
- binary instrumentation, analysis, and patching framework☆104Feb 20, 2026Updated last month
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆32Nov 14, 2025Updated 5 months ago
- Exploitation of CVE-2025-29969☆63Feb 20, 2026Updated last month
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 2 years ago
- ☆78Jan 1, 2026Updated 3 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆325Nov 20, 2025Updated 4 months ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 2 weeks ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Control flow deobfuscation helper for Genshin Impact☆13Apr 12, 2022Updated 4 years ago
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated last year
- 互通 Telegram 和 QQ 訊息☆10Feb 3, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆61Oct 24, 2025Updated 5 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 6 months ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- DMA PE (Portable Executable) Dumper with DTB patching capabilities.☆57Mar 28, 2025Updated last year
- ☆49Nov 26, 2025Updated 4 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆132Updated this week
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆28Apr 6, 2025Updated last year
- ☆20Sep 6, 2025Updated 7 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Notion C2 Profile for Mythic☆43Mar 3, 2026Updated last month
- Shh0ya Kernel Hook Driver☆24Dec 8, 2020Updated 5 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 11 months ago
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆36Jan 11, 2026Updated 3 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 2 months ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Binary Ninja plugin to analyze and simplify obfuscated code☆245Oct 11, 2025Updated 6 months ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- POC for your p2c "unique loader build"☆13Jun 28, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Some eternal WIP stuff :)☆21Nov 18, 2025Updated 4 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆93Nov 6, 2025Updated 5 months ago
- Chisel new generation, written in rust. SSH under WSS with some customization.☆129Jan 24, 2026Updated 2 months ago