PaulNorman01 / DynamizerLinks
Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.
☆21Updated 2 years ago
Alternatives and similar repositories for Dynamizer
Users that are interested in Dynamizer are comparing it to the libraries listed below
Sorting:
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- An attempt at reversing WindowsDefender☆20Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- ☆114Updated 3 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- ☆40Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆43Updated 4 years ago
- Scan for potentially vulnerable drivers☆91Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆89Updated last year
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆31Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 4 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆40Updated 4 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- ☆64Updated 2 years ago
- ☆11Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆37Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆28Updated 2 years ago
- Process Injection: APC Injection☆32Updated 4 years ago
- A Study in Obfuscation: Analyzing the effect of various techniques to bypass AV engines☆45Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆89Updated 2 years ago
- This program is used to perform reflective DLL Injection to a remote process specified by the user.☆65Updated 2 years ago
- Change hash for a signed pe☆16Updated 2 years ago
- Implementation of several code injection techniques.☆24Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- Hides processes from the windows task manager using IAT hooking.☆21Updated 4 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Updated 3 years ago
- Windows API Call Obfuscation☆109Updated 2 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆47Updated 8 years ago