ParkSnoopy / rust_llvm-arkari_ollvmLinks
merge rust-lang's llvm and KomiMoe's Arkari (llvm) to produce obfuscated llvm for rustc
☆28Updated last week
Alternatives and similar repositories for rust_llvm-arkari_ollvm
Users that are interested in rust_llvm-arkari_ollvm are comparing it to the libraries listed below
Sorting:
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆132Updated 2 years ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆109Updated last year
- Instantly suspend processes to bypass kernel driver protections.☆21Updated last year
- LLVM based obfuscation engine☆108Updated 5 months ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆168Updated last year
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆33Updated 2 years ago
- Implementation of sllvm obfuscator☆66Updated 3 years ago
- Rust bindings for VMProtect.☆26Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆63Updated 2 years ago
- ☆137Updated last year
- Detect BypassUAC using AMSI☆29Updated 9 months ago
- Cargo subcommand to build a crate into shellcode☆24Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 7 months ago
- Kotoamatsukami is an obfuscator based on LLVM-17, utilizing LLVM's new pass to implement plug-in features, for obfuscating multiple langu…☆57Updated 8 months ago
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆15Updated 3 weeks ago
- An x86-64 code virtualizer for VM based obfuscation☆146Updated 11 months ago
- ANY.RUN sandbox detection collection☆22Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆40Updated this week
- Minimalistic HTTP(S) client for the NT kernel☆52Updated last week
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- 使用 Intel 虚拟化特性实现应用层HOOK☆64Updated 3 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆91Updated 5 months ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Updated 7 months ago
- ☆32Updated 2 years ago
- ☆62Updated 4 months ago
- This repo contains EXPs about Vulnerable Windows Driver☆46Updated last year
- PoC exploit for HP Hardware Diagnostic's EtdSupp driver☆50Updated 2 years ago
- ☆21Updated 10 months ago