Ebfuscator: Abusing system errors for binary obfuscation
☆54Apr 12, 2020Updated 6 years ago
Alternatives and similar repositories for ebfuscator
Users that are interested in ebfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 8, 2021Updated 5 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- a binary x86win32 code obfuscator using virtual machine☆31Jan 8, 2017Updated 9 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 5 months ago
- An architecture-agnostic ELF file flattener for shellcode☆234Mar 14, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 6 years ago
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆48Sep 18, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Example of malicious codes for educational purpose, don't make shit with that☆28Feb 15, 2019Updated 7 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- ☆149Jan 7, 2020Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆32Apr 10, 2021Updated 5 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 11 months ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- A PoC tool for exploiting leaked process and thread handles☆34Feb 13, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Silencing Sysmon via driver unload☆238Oct 13, 2022Updated 3 years ago
- Linux Runtime Process Injection Tool☆62Feb 21, 2013Updated 13 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆39Mar 30, 2026Updated last month
- ☆14Sep 22, 2023Updated 2 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- ☆35Oct 18, 2022Updated 3 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 3 years ago