String obfuscation in GO
☆14Sep 19, 2019Updated 6 years ago
Alternatives and similar repositories for obfus
Users that are interested in obfus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆15Jan 19, 2020Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This is a libary to mimic the functionallity of the linux shred command.☆15Dec 11, 2020Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Oct 16, 2019Updated 6 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆13Dec 25, 2020Updated 5 years ago
- medium-rare☆28Nov 21, 2019Updated 6 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 7 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- a fast c-style struct packer & unpacker for golang☆36Jun 16, 2022Updated 3 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Add-ons, projects, active systems, etc. for x/84☆12Dec 12, 2017Updated 8 years ago
- Windows hidden thread suspend POC with code injection☆12May 27, 2017Updated 8 years ago
- A small tool to patch PE files' import address table with an external payload DLL.☆18Mar 19, 2026Updated 3 weeks ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- server2012-Group-policy-RCE☆46Oct 29, 2019Updated 6 years ago
- Allow a Go process to dynamically load .NET assemblies☆150Mar 28, 2020Updated 6 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 11 years ago
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- ☆21May 4, 2017Updated 8 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Jun 19, 2012Updated 13 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆19Updated this week
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Oct 27, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago