MahmoudZohdy / IAT-ObfuscationView external linksLinks
IAT-Obfuscation to make static analysis of executable harder.
☆44Sep 6, 2021Updated 4 years ago
Alternatives and similar repositories for IAT-Obfuscation
Users that are interested in IAT-Obfuscation are comparing it to the libraries listed below
Sorting:
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆23Sep 5, 2021Updated 4 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 10 months ago
- CLIPBRDWNDCLASS process injection technique(BOF) - execute beacon shellcode in callback☆68Sep 15, 2022Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆20Sep 6, 2021Updated 4 years ago
- ☆16Nov 23, 2021Updated 4 years ago
- Three different shellcode techniques on the Windows Kernel☆15Apr 8, 2025Updated 10 months ago
- ☆11Jan 8, 2022Updated 4 years ago
- Windows API Call Obfuscation☆112Dec 9, 2022Updated 3 years ago
- ☆12Oct 9, 2020Updated 5 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- ☆26Dec 29, 2021Updated 4 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Jun 22, 2021Updated 4 years ago
- base on winHttp to develep download☆12Apr 14, 2018Updated 7 years ago
- Porting of NPPSPY by Grzegorz Tworek to 'man in the middle' the user logon process, and store the user's name and password in an unassumi…☆19Apr 24, 2023Updated 2 years ago
- Protected Process Light Library☆18Jun 20, 2020Updated 5 years ago
- 关于intel和amd指令行为不一样这件事☆62Apr 15, 2022Updated 3 years ago
- eac memory sig maker☆14Jun 10, 2021Updated 4 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆23Oct 3, 2022Updated 3 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆29Dec 5, 2017Updated 8 years ago
- manual mapping injector☆29Sep 28, 2025Updated 4 months ago
- Simple windows rpc server for research purposes only☆83May 29, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆119Feb 8, 2022Updated 4 years ago
- A simple program to hook the current process to identify the manual syscall executions on windows☆265Nov 18, 2022Updated 3 years ago
- SetWinEventHook Sample☆50Sep 23, 2023Updated 2 years ago
- ☆17Aug 5, 2023Updated 2 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Apr 8, 2015Updated 10 years ago
- Hook system calls, context switches, page faults and more.☆34Jul 25, 2019Updated 6 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Feb 2, 2026Updated last week
- A simple program to obfuscate code written in cpp.☆51May 9, 2024Updated last year
- dk is a WinDbg extenion for dumping memory data in meaningful and organized ways, it is an enhancement of my previous tokenext project.☆26Feb 2, 2026Updated last week
- x64HOOK库☆18Jan 14, 2020Updated 6 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167May 27, 2021Updated 4 years ago
- c++ implementation of windows heavens gate☆70Feb 12, 2021Updated 5 years ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆33Nov 14, 2020Updated 5 years ago
- DLL-Obfuscation, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆22Sep 6, 2021Updated 4 years ago
- Unique signature maker plugin for x64dbg☆20Jan 1, 2022Updated 4 years ago