bytecode77 / bytecode-apiLinks
Framework for C# development
☆71Updated this week
Alternatives and similar repositories for bytecode-api
Users that are interested in bytecode-api are comparing it to the libraries listed below
Sorting:
- Loading a native DLL in the memory.☆70Updated 7 years ago
- This project describes a technique how a NATIVE dynamic link library (DLL) can be loaded from memory (In C#) without storing it on the ha…☆74Updated 6 years ago
- Anti-.NET Malware/Packers - Detect most .NET Packers (and some native) used for malware.☆25Updated 8 years ago
- Reads/writes memory, gets process/module info, injects dll, etc.☆46Updated 5 years ago
- ☆19Updated 5 years ago
- Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI☆79Updated 4 years ago
- ☆44Updated 9 years ago
- A basic .NET obfuscator uses dnlib, Modded KoiVM on decryption methods. Not stable for now, works on "crack me" executables.☆28Updated 4 years ago
- C# source code obfuscator☆18Updated 6 years ago
- A specialized C# memory-accessing library☆43Updated 7 years ago
- a very basic proxy obfuscator based on dnlib☆21Updated 7 years ago
- Learning Process Injection and Hollowing techniques☆42Updated 3 years ago
- .net debugger / msil interpreter / emulator☆16Updated 7 years ago
- DarksVM is a modified version of KoiVM, a complex ConfuserEx plugin that made it possible to virtualize methods and other data, increasin…☆36Updated 6 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Updated 7 years ago
- Remote process hooking library for .NET☆76Updated 6 years ago
- .NET executable packer☆62Updated 7 years ago
- simple WMI Viewer☆21Updated 5 years ago
- Think APIMonitor, but for .NET binaries.☆57Updated 2 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆48Updated 3 years ago
- A newly programmed tool that will deobfuscate Agile.Net Obfuscation.☆78Updated 3 years ago
- DotNet Obfuscator/Packer☆103Updated 5 years ago
- Simple obfuscator☆52Updated 4 months ago
- Locate the address of .NET metadata by CLR to anti anti dump☆72Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 3 years ago
- A quick way to check for the presence of dnSpy hooks in memory☆59Updated 3 years ago
- JITM is an automated tool to bypass the JIT Hooking protection on a .NET sample.☆56Updated 5 years ago
- [WIP] A next-generation protector for .NET applications (.NET Framework, .NET Core, and more)☆48Updated 4 years ago
- Disassemble bytecodes as MSIL☆18Updated 4 years ago
- A small virtualizer for .NET which works together with ConfuserEx☆66Updated 6 years ago