Ebfuscator: Abusing system errors for binary obfuscation
☆53Apr 12, 2020Updated 6 years ago
Alternatives and similar repositories for ebfuscator
Users that are interested in ebfuscator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Feb 8, 2021Updated 5 years ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 4 months ago
- An architecture-agnostic ELF file flattener for shellcode☆231Mar 14, 2022Updated 4 years ago
- PoC to demonstrate how CLR ETW events can be tampered.☆192Mar 26, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Driver and WinDBG scripts to dump information about all resources and lookaside lists☆66Apr 4, 2020Updated 6 years ago
- Command like tool to print mitigation flags for running processes in a memory dump☆48Sep 18, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- Registers Vectored Exception Handlers by directly manipulating internal LdrpVectorHandlerList structure instead of calling RtlAddVectored…☆38Jan 18, 2026Updated 2 months ago
- Supporting Materials for “Symbolic Triage” blog post☆24Oct 31, 2022Updated 3 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- Hex-Rays microcode API plugin for breaking an obfuscating compiler☆84Jun 29, 2019Updated 6 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Example of malicious codes for educational purpose, don't make shit with that☆29Feb 15, 2019Updated 7 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Oct 15, 2017Updated 8 years ago
- Windows syscall fuzzer that I used in 2017 & 2018. Not much to say about it but maybe helpful to someone. At least syscall information it…☆20Nov 20, 2019Updated 6 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- ☆46Aug 21, 2019Updated 6 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Allows IDA PRO to disassemble x86-64 code (WOW64) in 32-bit database☆27Dec 27, 2021Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 4 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- An approach to detect opaque predicates by identifying the damage caused by the obfuscation.☆32Apr 10, 2021Updated 5 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- IDA+Triton plugin in order to extract opaque predicates using a Forward-Bounded DSE. Example with X-Tunnel.☆57Aug 17, 2019Updated 6 years ago
- A PoC tool for exploiting leaked process and thread handles☆33Feb 13, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Silencing Sysmon via driver unload☆236Oct 13, 2022Updated 3 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆37Mar 30, 2026Updated last week
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- ☆14Sep 22, 2023Updated 2 years ago
- ☆17May 19, 2022Updated 3 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- ☆35Oct 18, 2022Updated 3 years ago