charles-mendoza / Obfuscator
C++11/14 obfuscation techniques.
☆40Updated 5 years ago
Alternatives and similar repositories for Obfuscator:
Users that are interested in Obfuscator are comparing it to the libraries listed below
- pointer obfuscation☆24Updated 7 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- ☆49Updated 5 years ago
- PointerGuard is a proof-of-concept tool used to create 'guarded' pointers which disguise pointer addresses, monitor reads/writes, and pre…☆52Updated 2 years ago
- Handling C++ & __try exceptions without the need of built-in handlers.☆69Updated 3 years ago
- a lightweight library geared towards windows process hacking/manipulation, but with much more use case.☆31Updated 3 years ago
- reverse engineering of bedaisy.sys (battleyes kernel driver) - Aki2k/BEDaisy☆82Updated 4 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆95Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- A wrapper class to hide the original calling address of a function☆57Updated 4 years ago
- ☆50Updated 4 years ago
- ☆37Updated 7 years ago
- x64 syscall caller in C++.☆87Updated 6 years ago
- Memory integrity check with CRC32 instruction, section-based☆43Updated 2 years ago
- mouseclassservicecallback detection via hook☆50Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆41Updated 3 years ago
- Kernel Lazy Importer☆109Updated 11 months ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Currently supports injecting signed/unsigned DLLs in 64-bit processes☆59Updated 4 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- Enable SEH support for manual mapped x86-32bit PEs☆66Updated 6 years ago
- windows kernel deriver loader(pro)☆46Updated 4 years ago
- x64 manual mapper using inline syscalls☆9Updated 3 years ago
- Simple memory obfuscator.☆24Updated 2 years ago
- based on https://github.com/secrary/Hooking-via-InstrumentationCallback☆69Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆79Updated 4 years ago
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Updated 4 years ago
- Manual PE image mapper☆64Updated 11 years ago