A Just-In-Time Decrypter for Windows executables (x86 and x64) that performs real-time, instruction-level decryption of encrypted code sections, enhancing runtime protection against static and dynamic analysis.
☆54Nov 3, 2025Updated 4 months ago
Alternatives and similar repositories for JitDecrypter
Users that are interested in JitDecrypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple memory dumper☆13Feb 11, 2020Updated 6 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆29Nov 14, 2025Updated 4 months ago
- binary instrumentation, analysis, and patching framework☆102Feb 20, 2026Updated last month
- Living Off The Land API☆59Feb 2, 2026Updated last month
- A debugger for Windows ARM64 (AARCH64), user-friendly for reverse engineers, malware analysts, malware developers, game hacking, operatin…☆73May 6, 2025Updated 10 months ago
- Exploitation of CVE-2025-29969☆57Feb 20, 2026Updated last month
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- An example of how to use Microsoft Windows Warbird technology☆97Apr 23, 2023Updated 2 years ago
- ☆76Jan 1, 2026Updated 2 months ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆322Nov 20, 2025Updated 4 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆101Mar 17, 2026Updated last week
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Control flow deobfuscation helper for Genshin Impact☆13Apr 12, 2022Updated 3 years ago
- 互通 Telegram 和 QQ 訊息☆10Feb 3, 2023Updated 3 years ago
- ☆61Oct 24, 2025Updated 5 months ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 5 months ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- ☆51Nov 26, 2025Updated 3 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆51Oct 19, 2025Updated 5 months ago
- DMA PE (Portable Executable) Dumper with DTB patching capabilities.☆56Mar 28, 2025Updated 11 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆27Apr 6, 2025Updated 11 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆117Oct 30, 2025Updated 4 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- Shh0ya Kernel Hook Driver☆24Dec 8, 2020Updated 5 years ago
- Binary Ninja Plugins to work with Unpac.Me unpacking service☆12Apr 24, 2025Updated 11 months ago
- A custom implementation of the Nanomites protection technology for Windows executables (x86 and x64) originally introduced by Silicon Rea…☆36Jan 11, 2026Updated 2 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- An open-source tool for efficiently parsing x64dbg trace files (.trace32 & .trace64).☆41Jan 20, 2026Updated 2 months ago
- Binary Ninja plugin to analyze and simplify obfuscated code☆242Oct 11, 2025Updated 5 months ago
- Fake Timestamps of Driver Certificates while keeping validity.☆18Jul 15, 2021Updated 4 years ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆52May 16, 2025Updated 10 months ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆27Feb 4, 2026Updated last month
- POC for your p2c "unique loader build"☆13Jun 28, 2024Updated last year
- Evasion kit for Cobalt Strike☆30Jan 16, 2026Updated 2 months ago
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆92Nov 6, 2025Updated 4 months ago