andrivet / ADVobfuscatorLinks
Obfuscation library based on C++11/14 and metaprogramming
☆1,502Updated this week
Alternatives and similar repositories for ADVobfuscator
Users that are interested in ADVobfuscator are comparing it to the libraries listed below
Sorting:
- A tiny C++ obfuscation framework☆698Updated 5 years ago
- Guaranteed compile-time string literal obfuscation header-only library for C++14☆1,217Updated last year
- heavily vectorized c++17 compile time string encryption.☆1,349Updated 3 years ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,811Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,273Updated 3 months ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆987Updated 2 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,754Updated last month
- Library to load a DLL from memory.☆3,017Updated last year
- A bunch of Windows anti-debugging tricks for x86 and x64.☆793Updated 4 years ago
- Hook system calls, context switches, page faults and more.☆2,579Updated 2 years ago
- Principled, lightweight C/C++ PE parser☆861Updated 2 weeks ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆594Updated 3 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆562Updated 2 months ago
- x86/x64 C++ Hooking Library☆917Updated 5 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,242Updated last year
- Inline syscalls made easy for windows on clang☆720Updated last year
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,141Updated 6 years ago
- Obfuscate specific windows apis with different apis☆1,009Updated 4 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,221Updated last year
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆870Updated 2 months ago
- Hook function calls by inserting jump instructions at runtime☆705Updated last year
- Windows NT Syscall tables☆1,319Updated last month
- anti debugging library in c++.☆568Updated last year
- Hiding kernel-driver for x86/x64.☆2,446Updated 2 months ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,052Updated 2 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆923Updated 4 years ago
- Powerful Disassembler Library For x86/AMD64☆1,307Updated last year
- Protected Processes Light Killer☆952Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,528Updated 2 months ago
- A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager☆684Updated 6 years ago