KpwnZ / sllvm-obfuscator
Implementation of sllvm obfuscator
☆66Updated 2 years ago
Alternatives and similar repositories for sllvm-obfuscator:
Users that are interested in sllvm-obfuscator are comparing it to the libraries listed below
- Yet another LLVM-based obfuscator☆110Updated 5 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆66Updated last year
- Injecting into SELinux-protected system service processes under root on Android.☆38Updated 11 months ago
- An x86-64 code virtualizer for VM based obfuscation☆104Updated 2 months ago
- A GKI Android kernel driver(ARMv8.3) template compiled by llvm-msvc☆34Updated 9 months ago
- LLVM obfuscation pass, flattening at the basic block's level and turning each basic block into a dispacher and each instruction into a ne…☆46Updated 3 years ago
- In-memory ELF shared library loading☆37Updated 2 years ago
- Disassembler for Zeus VM custom instruction set☆27Updated last year
- Obfuscat is a tool and framework for obfuscation with predictable size and runtime overhead.☆37Updated last year
- The tool can be used to eliminate redundant instructions in a basic block.☆79Updated last year
- ☆18Updated 4 months ago
- A collection of LLVM passes for obfuscating☆32Updated last year
- Report and exploit of CVE-2024-21305.☆34Updated last year
- ☆19Updated 7 years ago
- Utilities scripts and Python module to facilitate executing idapython scripts in IDA.☆23Updated last week
- Getting better stacks and backtraces in Frida☆35Updated 8 months ago
- Frida's setHardwareWatchpoint tutorial☆26Updated 4 months ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆119Updated last year
- ANY.RUN sandbox detection collection☆15Updated 6 months ago
- Sample/PoC Windows kernel driver for detect DMA devices by using Vendor ID and Device ID signatures☆32Updated 4 months ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆22Updated 2 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- a code virtualizer based on angr☆29Updated 2 years ago
- A kernel exploit leveraging NtUserHardErrorControl to elevate a thread to KernelMode and achieve arbitrary kernel R/W & more.☆26Updated 2 years ago
- User-friendly reference finder in IDA☆39Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆26Updated last month
- Me fockin' pe protector☆44Updated 2 years ago
- Finding Truth in the Shadows☆88Updated 2 years ago
- IDA plugin to aid with Swift reverse engineering☆28Updated 3 months ago
- ☆36Updated 2 years ago