PaulNorman01 / Dynamizer
Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
☆18Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Dynamizer
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆19Updated 2 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- Using Thread Description To Hide Shellcodes☆13Updated 2 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆21Updated last year
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆31Updated 2 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated 9 months ago
- A kernel mode Windows rootkit in development.☆49Updated 2 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆41Updated 3 years ago
- Process Injection: APC Injection☆27Updated 3 years ago
- ☆22Updated last year
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆27Updated 3 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆38Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated last month
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- ☆37Updated last year
- Subtract one PE file from another!☆19Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆20Updated last year
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆17Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆53Updated 2 years ago
- ☆48Updated last year
- ☆27Updated 4 months ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆20Updated 2 years ago