ac3ss0r / NjCloakLinks
A tool designed to increase privacy on Windows and counter malware using various techniques.
☆12Updated 7 months ago
Alternatives and similar repositories for NjCloak
Users that are interested in NjCloak are comparing it to the libraries listed below
Sorting:
- PoC kernel to usermode injection☆89Updated last year
- X86 Packer with Portable Executable compatibility.☆61Updated 2 months ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆13Updated last year
- Detects virtual machines and malware analysis environments☆139Updated 3 years ago
- DSE & PG bypass via BYOVD attack☆66Updated 4 months ago
- Windows 10/11 unsigned kernel driver load/debugging☆14Updated 2 years ago
- An Unsigned Driver Mapper for Windows 10 22H2 -> Windows 11 23H2 that uses PdFwKrnl to exploit the Read/Write IOCTL Calls to disable DSE …☆18Updated last year
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- A modern C++20 header-only library for advanced direct system call invocation.☆158Updated 3 weeks ago
- Experiment with PAGE_GUARD protection to hide memory from other processes☆52Updated last year
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆30Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- C/C++ antidebugging library for Windows☆42Updated 2 weeks ago
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 3 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆187Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 3 years ago
- ☆47Updated 9 months ago
- silence file system monitoring components by hooking their minifilters☆58Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆65Updated 2 years ago
- spoof return address☆77Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 9 months ago
- Compileable POC of namazso's x64 return address spoofer.☆50Updated 5 years ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆218Updated this week
- A C/C++ framework designed to simplify shellcode creation on any compilers and platforms using C. Supports Windows & Linux, and practical…☆18Updated last year
- manual map unsigned driver over signed memory☆206Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆92Updated 7 months ago
- kASLR bypass technique on Intel CPUs.☆31Updated 6 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆105Updated last month