andrivet / ADVobfuscatorLinks
Obfuscation library based on C++20 and metaprogramming
☆1,548Updated last month
Alternatives and similar repositories for ADVobfuscator
Users that are interested in ADVobfuscator are comparing it to the libraries listed below
Sorting:
- A tiny C++ obfuscation framework☆698Updated 5 years ago
- Guaranteed compile-time string literal obfuscation header-only library for C++14☆1,224Updated last month
- heavily vectorized c++17 compile time string encryption.☆1,372Updated 3 years ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,825Updated 2 years ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆986Updated 2 years ago
- Hook system calls, context switches, page faults and more.☆2,585Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,284Updated 4 months ago
- Principled, lightweight C/C++ PE parser☆871Updated last month
- A bunch of Windows anti-debugging tricks for x86 and x64.☆793Updated 4 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,770Updated last week
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆565Updated 4 months ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆600Updated 3 years ago
- x86/x64 C++ Hooking Library☆918Updated 5 years ago
- Inline syscalls made easy for windows on clang☆724Updated last year
- Library to load a DLL from memory.☆3,035Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,250Updated last year
- Run a Exe File (PE Module) in memory (like an Application Loader)☆922Updated 4 years ago
- Hiding kernel-driver for x86/x64.☆2,474Updated last month
- Windows NT Syscall tables☆1,330Updated last month
- Obfuscate specific windows apis with different apis☆1,010Updated 4 years ago
- Native API header files for the System Informer project.☆1,262Updated 4 months ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,953Updated 3 years ago
- Monitoring and controlling kernel API calls with stealth hook using EPT☆1,300Updated 3 years ago
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,147Updated 6 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆892Updated last year
- Hook function calls by inserting jump instructions at runtime☆712Updated last week
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,248Updated last year
- anti debugging library in c++.☆569Updated last year
- A Pin Tool for tracing API calls etc☆1,541Updated last week
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,760Updated last year