d35ha / xObf
Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine
☆265Updated 2 years ago
Alternatives and similar repositories for xObf:
Users that are interested in xObf are comparing it to the libraries listed below
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆311Updated 2 years ago
- x86 PE Mutator☆215Updated 2 years ago
- Native code virtualizer for x64 binaries☆481Updated 3 months ago
- System call hook for Windows 10 20H1☆483Updated 3 years ago
- Windows inline hooking tool.☆254Updated 6 years ago
- Debugger Anti-Detection Benchmark☆327Updated last year
- Kernel LdrLoadDll injector☆259Updated 6 years ago
- ☆177Updated 3 years ago
- Analyze patches in a process☆251Updated 3 years ago
- Vectored Exception Handling Hooking Class☆154Updated 6 years ago
- Load your driver like win32k.sys☆251Updated 2 years ago
- An x86-64 Code Virtualizer☆251Updated 6 months ago
- Browse Page Tables on Windows (Page Table Viewer)☆197Updated 3 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆335Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆202Updated 3 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆286Updated 4 years ago
- State of the art DLL injector that took 20 minutes to make☆212Updated last year
- C++ library for parsing and manipulating PE files statically and dynamically.☆86Updated last year
- Bypassing PatchGuard on modern x64 systems☆257Updated 2 years ago
- IDA Pro plugin to make bitfield accesses easier to grep☆232Updated 2 months ago
- ☆152Updated 5 years ago
- Collection of hypervisor detections☆230Updated 6 months ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆240Updated last year
- Elevate a process to be a protected process☆149Updated 5 years ago
- Demo proof of concept for shadow regions, and implementation of HyperDeceit.☆275Updated last year
- Minimalistic AMD-V/SVM hypervisor with memory introspection capabilities☆251Updated last month
- Kernel Inject DLL☆345Updated 2 years ago
- ☆198Updated 2 years ago
- A x64 Windows Rootkit using SSDT or Hypervisor hook☆532Updated 3 months ago
- C++ 17 or higher control flow obfuscation library for windows binaries☆354Updated 7 months ago