ParkSnoopy / rust_llvm-arkari_ollvmLinks
merge rust-lang's llvm and KomiMoe's Arkari (llvm) to produce obfuscated llvm for rustc
☆36Updated 2 weeks ago
Alternatives and similar repositories for rust_llvm-arkari_ollvm
Users that are interested in rust_llvm-arkari_ollvm are comparing it to the libraries listed below
Sorting:
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆133Updated 2 years ago
- Detect BypassUAC using AMSI☆29Updated 11 months ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆64Updated 3 years ago
- out-of-tree llvm obfuscation pass plugin (dynamically loadable by rustc). || rust toolchain with obfuscation llvm pass.☆175Updated last year
- An Obfuscator-LLVM based mingw-w64 toolchain.☆46Updated 4 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆33Updated 2 years ago
- UAC Bypass using RequestTrace scheduled task☆23Updated 10 months ago
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆40Updated 6 months ago
- BYOVD hunter to help prioritize windows drivers worth manual analysis☆46Updated 5 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- demo unhooking functions in ntdll☆28Updated 6 months ago
- ProcessGhosting 技术的 rust 实现版本☆26Updated last year
- A COFF Loader written in Rust☆133Updated last month
- shellcode生成框架☆89Updated last year
- ☆34Updated 2 years ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- An implementation of an indirect system call☆131Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆16Updated 2 years ago
- Instantly suspend processes to bypass kernel driver protections.☆20Updated last year
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆24Updated 8 months ago
- find dll base addresses without PEB WALK☆156Updated 6 months ago
- Minimalistic HTTP(S) client for the NT kernel☆61Updated last month
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆284Updated 2 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆112Updated 3 months ago
- HVNC PoC (Hidden VNC) in Rust☆38Updated 4 months ago
- In-memory hiding technique☆63Updated last year
- Simulate per-process disconnection in red team environments☆113Updated 7 months ago
- A reflective DLL development template for the Rust programming language☆112Updated 2 months ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆77Updated 4 years ago