SamuelTulach / OccultoLinks
Proof-of-concept post-build obfuscator for Unity IL2CPP projects
☆24Updated 8 months ago
Alternatives and similar repositories for Occulto
Users that are interested in Occulto are comparing it to the libraries listed below
Sorting:
- Kernel ReClassEx☆64Updated last year
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- ☆46Updated 3 years ago
- Yet another IDA Pro/Home plugin for deobfuscating stack strings☆73Updated last month
- ☆32Updated 11 months ago
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆33Updated last year
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆54Updated 3 years ago
- POC Hook of nt!HvcallCodeVa☆52Updated 2 years ago
- PoC kernel to usermode injection☆87Updated last year
- Windows PDB parser for kernel-mode environment.☆98Updated 3 months ago
- A debugger library using VEH.☆64Updated last year
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Updated 3 years ago
- partially disable patchguard up to win11 21H2☆19Updated last year
- Extracts eac's driver at runtime without it touching the disk.☆35Updated 5 months ago
- A C++ wrapper for icedx86 decoder☆34Updated last month
- ☆26Updated last year
- comparing data of module exports from disk and memory, then caching any differences.☆26Updated 3 years ago
- Binary rewriter for 64-bit PE files.☆84Updated last year
- ☆47Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆46Updated 11 months ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year
- ☆30Updated 3 years ago
- Using MMIO (Memory-Mapped I/O) to read TPM 2.0 public Endorsement Key.☆49Updated last year
- Runtime Hyper-V Hijacking with DDMA☆55Updated last month
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆47Updated 2 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year
- A library to assist with memory & code protection.☆64Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 5 years ago
- Custom KiSystemStartup, can be used to modificate kernel before boot.☆52Updated 3 years ago
- cr3 shuffle driver☆61Updated last year