PaulNorman01 / DynamizerLinks
Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
β21Updated 2 years ago
Alternatives and similar repositories for Dynamizer
Users that are interested in Dynamizer are comparing it to the libraries listed below
Sorting:
- Read Memory without ReadProcessMemory for Current Processβ89Updated 3 years ago
- π» Windows 10 Kernel-mode rootkitβ32Updated 3 years ago
- Process Injection: APC Injectionβ32Updated 4 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1β34Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll importβ89Updated last month
- An attempt at reversing WindowsDefenderβ20Updated last year
- Listing UDP connections with remote address without sniffing.β31Updated 2 years ago
- β65Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function callsβ38Updated 2 years ago
- β114Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.β32Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.β44Updated 4 years ago
- β39Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCrβ¦β63Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.β111Updated 2 years ago
- Phantom DLL Hollowing method implemented in modmapβ17Updated 4 years ago
- A Bumblebee-inspired Crypterβ78Updated 2 years ago
- Scan for potentially vulnerable driversβ92Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryptionβ90Updated 2 years ago
- β11Updated 3 years ago
- Windows API Call Obfuscationβ109Updated 2 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwrittiβ¦β40Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.β23Updated 2 years ago
- Process Hollowing demonstration & explanationβ34Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcodeβ50Updated last year
- Bypass UAC elevation on Windows 8 (build 9600) & above.β57Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variablesβ33Updated 4 years ago
- Research of modifying exported function names at runtime (C/C++, Windows)β18Updated last year
- A kernel mode Windows rootkit in development.β49Updated 3 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.β31Updated 4 years ago