Ebfuscator: Abusing system errors for binary obfuscation
☆52Apr 12, 2020Updated 5 years ago
Alternatives and similar repositories for ebfuscator
Users that are interested in ebfuscator are comparing it to the libraries listed below
Sorting:
- ☆12Feb 8, 2021Updated 5 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 3 months ago
- An architecture-agnostic ELF file flattener for shellcode☆231Mar 14, 2022Updated 4 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆47Sep 18, 2020Updated 5 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 5 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆35Jan 18, 2026Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆31Apr 10, 2021Updated 4 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- A PoC tool for exploiting leaked process and thread handles☆32Feb 13, 2024Updated 2 years ago
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Mar 12, 2026Updated last week
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- ☆17May 19, 2022Updated 3 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago