ac3ss0r / NjCloakLinks
A tool designed to increase privacy on Windows and counter malware using various techniques.
☆12Updated 5 months ago
Alternatives and similar repositories for NjCloak
Users that are interested in NjCloak are comparing it to the libraries listed below
Sorting:
- PoC kernel to usermode injection☆87Updated last year
- Detects virtual machines and malware analysis environments☆137Updated 2 years ago
- abusing signed pdfwkrnl.sys for kernel function calling from usermode.☆20Updated last week
- DSE & PG bypass via BYOVD attack☆62Updated 2 months ago
- X86 Packer with Portable Executable compatibility.☆57Updated 3 weeks ago
- Compile-Time Calls Obfuscator for C++14+☆50Updated last year
- A modern C++20 header-only library for advanced direct system call invocation.☆139Updated last week
- A C/C++ framework designed to simplify shellcode creation on any compilers and platforms using C. Supports Windows & Linux, and practical…☆16Updated last year
- Windows 10/11 unsigned kernel driver load/debugging☆14Updated 2 years ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆49Updated last year
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆13Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆184Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆36Updated 2 years ago
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆64Updated 2 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆29Updated last year
- spoof return address☆77Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 3 years ago
- ☆124Updated last year
- PE Header (.rdata,.data,.text) obsfucation☆38Updated 3 years ago
- An x86-64 code virtualizer for VM based obfuscation☆135Updated 9 months ago
- Demystifying PatchGuard is a comprehensive analysis of Microsoft's security feature called PatchGuard, which is designed to prevent unaut…☆129Updated 2 years ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆13Updated last year
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- manual map unsigned driver over signed memory☆201Updated last year
- C/C++ antidebugging library for Windows☆37Updated 3 weeks ago
- hidden_syscall - syscaller without using syscall instruction in code☆62Updated 2 years ago
- using wnbios64.sys for arbitrary r/w☆15Updated last year
- ☆46Updated 7 months ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆89Updated 5 months ago
- browse microsoft driver server for potentially vulnerable drivers☆23Updated last year