enkomio / MealyObfuscatorView external linksLinks
String obfuscator based on the Mealy automata
☆13Sep 16, 2017Updated 8 years ago
Alternatives and similar repositories for MealyObfuscator
Users that are interested in MealyObfuscator are comparing it to the libraries listed below
Sorting:
- Simple IOCTL hooking driver for Kernel- User - Mode communication.☆11Jul 26, 2020Updated 5 years ago
- ☆12Oct 12, 2021Updated 4 years ago
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆19Jul 8, 2022Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- ☆14Apr 7, 2018Updated 7 years ago
- A simple and easy-to-use DLL injector!☆11Mar 23, 2024Updated last year
- Illustrates the concept of return address spoofing, and how it is used.☆14May 13, 2020Updated 5 years ago
- Register a callback from a Manually mapped kernel module☆15Feb 1, 2022Updated 4 years ago
- Simple dll injector that uses thread hijacking to execute the payload☆12Jul 7, 2022Updated 3 years ago
- My try to implement a virtual CPU in C☆19Nov 18, 2023Updated 2 years ago
- Small class to help perform syscalls.☆21May 15, 2025Updated 9 months ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- ☆22Jan 30, 2021Updated 5 years ago
- Stealing signatures from pe files☆15Apr 1, 2025Updated 10 months ago
- ☆15Feb 9, 2018Updated 8 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Un proyecto de Anti-Cheat para la comunidad Cubana.☆13Sep 7, 2021Updated 4 years ago
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Feb 7, 2022Updated 4 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- ☆23May 17, 2022Updated 3 years ago
- Signature scanner and API hooks to detect malicious process injection☆29Mar 11, 2023Updated 2 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74May 20, 2021Updated 4 years ago
- NtCreateUserProcess with CsrClientCallServer for mainstream Windows x64 version☆43Jul 16, 2024Updated last year
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆32May 18, 2022Updated 3 years ago
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago
- Kernel mode to user mode dll injection.☆14Nov 10, 2024Updated last year
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆72Oct 7, 2022Updated 3 years ago
- Rite Of Passage ROP Injector☆34Aug 4, 2019Updated 6 years ago
- A Privacy-Conscious, DNS-over-HTTP-Enabled, Blacklist-Incorporating SOCKS5 Proxy☆30Feb 28, 2019Updated 6 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- hook detector☆31Nov 4, 2021Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago