andrivet / ADVobfuscatorLinks
Obfuscation library based on C++20 and metaprogramming
☆1,578Updated 2 months ago
Alternatives and similar repositories for ADVobfuscator
Users that are interested in ADVobfuscator are comparing it to the libraries listed below
Sorting:
- A tiny C++ obfuscation framework☆701Updated 5 years ago
- Guaranteed compile-time string literal obfuscation header-only library for C++14☆1,239Updated 2 months ago
- heavily vectorized c++17 compile time string encryption.☆1,380Updated 4 years ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,844Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,300Updated 2 weeks ago
- Helper library for x86 programs that runs under WOW64 layer on x64 versions of Microsoft Windows operating systems.☆990Updated 2 years ago
- Principled, lightweight C/C++ PE parser☆877Updated 2 months ago
- A bunch of Windows anti-debugging tricks for x86 and x64.☆794Updated 4 years ago
- C++20, x86/x64 Hooking Libary v2.0☆1,790Updated last month
- x86/x64 C++ Hooking Library☆920Updated 5 years ago
- Hook system calls, context switches, page faults and more.☆2,602Updated 2 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆606Updated 3 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆570Updated 5 months ago
- Inline syscalls made easy for windows on clang☆727Updated last year
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,257Updated last year
- Library to load a DLL from memory.☆3,056Updated last year
- anti debugging library in c++.☆570Updated last year
- Windows NT Syscall tables☆1,341Updated 2 weeks ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆931Updated 4 years ago
- Detours with just single dependency - NTDLL☆654Updated 3 years ago
- Unicorn PE is an unicorn based instrumentation project designed to emulate code execution for windows PE files.☆893Updated last year
- Driver loader for bypassing Windows x64 Driver Signature Enforcement☆1,161Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,252Updated last year
- Hiding kernel-driver for x86/x64.☆2,536Updated 2 months ago
- A dynamic VMP dumper and import fixer, powered by VTIL.☆1,299Updated 5 years ago
- Virtual-machine Translation Intermediate Language☆1,439Updated 2 years ago
- pdbex is a utility for reconstructing structures and unions from the PDB into compilable C headers☆873Updated 5 months ago
- Native API header files for the System Informer project.☆1,285Updated 5 months ago
- xAnalyzer plugin for x64dbg☆1,150Updated 3 months ago
- Windows kernel hacking framework, driver template, hypervisor and API written on C++☆1,776Updated 2 years ago