Peribunt / XORString
Easy to include string and wstring obfuscation
☆18Updated 3 years ago
Alternatives and similar repositories for XORString:
Users that are interested in XORString are comparing it to the libraries listed below
- Based on minhook☆31Updated last year
- hook system call that on user mode☆13Updated 3 years ago
- Windows kernel drivers simple HTTP library for modern C++☆42Updated 6 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆43Updated last month
- ☆15Updated 4 months ago
- ☆34Updated 2 years ago
- ☆27Updated last year
- ☆24Updated last year
- ☆71Updated 2 years ago
- clearing traces of a loaded driver☆47Updated 2 years ago
- The driver STL library used by myself☆12Updated 2 years ago
- Small class to parse debug info from PEs, download their respective PDBs from the Microsoft Public Symbol Server and calculate RVAs of fu…☆43Updated last year
- Very easy to use pdb parsing library with only one header file,You can use it even if you are a fool.☆10Updated last year
- A Simple Example☆21Updated 6 years ago
- APC注入DLL内核层☆23Updated 6 years ago
- windows kernel pagehook☆39Updated 2 years ago
- A poc that abuses Enclave☆37Updated 2 years ago
- ☆15Updated 2 years ago
- Static user/kernel mode library that allows access to all functions and global variables by extracting offsets from the PDB☆83Updated last year
- ☆69Updated 3 years ago
- detect hypervisor with Nmi Callback☆34Updated 2 years ago
- ☆17Updated 2 years ago
- eac memory sig maker☆12Updated 3 years ago
- VEH debug plugin☆14Updated 2 years ago
- ☆30Updated last year
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Windows Kernel nt files - To research windows kernel☆15Updated 4 years ago
- Hiding a system thread against conventional means of detection☆39Updated 4 years ago
- Example of hijacking system calls via function pointer tables