A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code sections, enhancing runtime protection against static and dynamic analysis.
☆57Nov 3, 2025Updated 6 months ago
Alternatives and similar repositories for JitDecrypter
Users that are interested in JitDecrypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple memory dumper☆13Feb 11, 2020Updated 6 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 6 months ago
- Living Off The Land API☆59Feb 2, 2026Updated 3 months ago
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆73May 6, 2025Updated 11 months ago
- binary instrumentation, analysis, and patching framework☆105Feb 20, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆31Nov 14, 2025Updated 5 months ago
- Exploitation of CVE-2025-29969☆64Feb 20, 2026Updated 2 months ago
- An example of how to use Microsoft Windows Warbird technology☆94Apr 23, 2023Updated 3 years ago
- ☆78Jan 1, 2026Updated 4 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆328Nov 20, 2025Updated 5 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Control flow deobfuscation helper for Genshin Impact☆13Apr 12, 2022Updated 4 years ago
- a small curation of created/stolen scripts for reverse engineering☆12May 3, 2024Updated 2 years ago
- 互通 Telegram 和 QQ 訊息☆10Feb 3, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆61Oct 24, 2025Updated 6 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 6 months ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- DMA PE (Portable Executable) Dumper with DTB patching capabilities.☆59Mar 28, 2025Updated last year
- ☆50Nov 26, 2025Updated 5 months ago
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆29Apr 6, 2025Updated last year
- ☆24Sep 6, 2025Updated 7 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- Notion C2 Profile for Mythic☆45Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆140Apr 26, 2026Updated last week
- Shh0ya Kernel Hook Driver☆24Dec 8, 2020Updated 5 years ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 10 months ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated last year
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆36Jan 11, 2026Updated 3 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆43Jan 20, 2026Updated 3 months ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Binary Ninja plugin to analyze and simplify obfuscated code☆246Oct 11, 2025Updated 6 months ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆75Mar 27, 2026Updated last month
- POC for your p2c "unique loader build"☆13Jun 28, 2024Updated last year
- Some eternal WIP stuff :)☆21Nov 18, 2025Updated 5 months ago
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 3 months ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆44Jul 29, 2025Updated 9 months ago