PaulNorman01 / DynamizerLinks
Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
☆21Updated 3 years ago
Alternatives and similar repositories for Dynamizer
Users that are interested in Dynamizer are comparing it to the libraries listed below
Sorting:
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- ☆39Updated 2 years ago
- Scan for potentially vulnerable drivers☆93Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated last year
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 2 months ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆24Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Updated 4 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- A Bumblebee-inspired Crypter☆79Updated 3 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆35Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 4 years ago
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Updated 2 years ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- ☆12Updated 3 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆90Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆57Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- ☆114Updated 3 years ago
- Process Injection: APC Injection☆31Updated 4 years ago
- ☆65Updated 3 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆46Updated 3 years ago
- A kernel mode Windows rootkit in development.☆49Updated 4 years ago