ac3ss0r / NjCloakLinks
A tool designed to increase privacy on Windows and counter malware using various techniques.
☆13Updated 9 months ago
Alternatives and similar repositories for NjCloak
Users that are interested in NjCloak are comparing it to the libraries listed below
Sorting:
- x86-x64 Packer with Portable Executable compatibility.☆97Updated last month
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆30Updated last year
- Compile-Time Calls Obfuscator for C++14+☆50Updated 2 years ago
- PoC kernel to usermode injection☆103Updated last year
- Detects virtual machines and malware analysis environments☆145Updated 3 years ago
- Usermode exploit to bypass any AC using a 0day shatter attack.☆247Updated 2 months ago
- ntoskrnl .data hooks for UM-KM communication☆53Updated last year
- Experiment with PAGE_GUARD protection to hide memory from other processes☆54Updated last year
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆287Updated 2 months ago
- DSE & PG bypass via BYOVD attack☆77Updated 6 months ago
- vm_str.hpp is a header only string obfuscator.☆103Updated 5 months ago
- using wnbios64.sys for arbitrary r/w☆15Updated 3 months ago
- A modern C++20 header-only library for advanced direct system call invocation.☆165Updated 2 weeks ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆111Updated 3 months ago
- A C/C++ framework designed to simplify shellcode creation on any compilers and platforms using C. Supports Windows & Linux, and practical…☆19Updated last year
- Windows 10/11 unsigned kernel driver load/debugging☆16Updated 2 years ago
- C/C++ antidebugging library for Windows☆49Updated 2 months ago
- An x86-64 code virtualizer for VM based obfuscation☆168Updated last year
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- browse microsoft driver server for potentially vulnerable drivers☆30Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆193Updated 2 years ago
- Spoof the return address of any function call.☆11Updated last year
- Abusing DDMA alongside Copy On Write for Cross Process Code Execution for a 3000$ Bug Bounty☆82Updated 3 weeks ago
- Translate virtual addresses to physical addresses from usermode.☆98Updated last year
- Kernel Level NMI Callback Blocker☆154Updated 4 months ago
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- Load dll with undocumented functions and debug symbols☆47Updated last year
- ☆46Updated 11 months ago
- silence file system monitoring components by hooking their minifilters☆59Updated 2 years ago
- kernel-mode DLL Injector☆124Updated 9 months ago