SamuelTulach / OccultoLinks
Proof-of-concept post-build obfuscator for Unity IL2CPP projects
☆24Updated 9 months ago
Alternatives and similar repositories for Occulto
Users that are interested in Occulto are comparing it to the libraries listed below
Sorting:
- Kernel ReClassEx☆64Updated last year
- Improved VMP Idea(detect anti-anti-debug tools by bug)☆46Updated 2 years ago
- ☆47Updated last year
- PoC kernel to usermode injection☆87Updated last year
- Decrypting and intercepting encrypted imports of Vanguards Kernel Driver☆35Updated last year
- ☆47Updated 3 years ago
- Windows driver mapper via the UEFI☆49Updated 3 months ago
- cr3 shuffle driver☆64Updated last year
- ☆28Updated last year
- POC Hook of nt!HvcallCodeVa☆53Updated 2 years ago
- Just tried, unusable☆46Updated last year
- ☆32Updated last year
- ☆43Updated 2 years ago
- A debugger library using VEH.☆64Updated last year
- partially disable patchguard up to win11 21H2☆18Updated last year
- Disable NMI Callbacks with Kernelmode Driver☆18Updated 2 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆14Updated 5 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆47Updated last month
- ☆38Updated 2 years ago
- Hardware ID☆54Updated 3 years ago
- ☆84Updated 2 weeks ago
- driver that communicates using a shared section☆73Updated 7 months ago
- mouseclassservicecallback detection via hook☆52Updated 3 years ago
- Made by scammer so i leak for free ! have fun☆55Updated 2 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆30Updated 3 years ago
- PAGE_GUARD based hooking library☆52Updated 3 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆51Updated last year
- clearing traces of a loaded driver☆47Updated 3 years ago
- ☆42Updated 3 years ago
- Symbolic Execution based on lifting amd64 to z3☆28Updated last year