garzon / obfacrosLinks
obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.
☆46Updated 6 years ago
Alternatives and similar repositories for obfacros
Users that are interested in obfacros are comparing it to the libraries listed below
Sorting:
- ☆73Updated 6 months ago
- Helper script for Windows kernel debugging with IDA Pro on native Bochs debugger (including PDB symbols)☆62Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 4 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- a code virtualizer based on angr☆32Updated 3 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆61Updated 5 years ago
- 关于intel和amd指令行为不一样这件事☆62Updated 3 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆80Updated 4 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆60Updated 6 years ago
- ☆23Updated 6 years ago
- ☆64Updated 2 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Updated 2 years ago
- vmp2.x devirtualization☆90Updated last year
- Rootkit & Anti-rootkit☆41Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 3 years ago
- VMProtectTest☆40Updated 2 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆68Updated 2 years ago
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆64Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆76Updated 3 years ago
- direct systemcalls with a modern c++20 interface.☆45Updated 3 years ago
- Wow64 Heaven's Gate Hook☆29Updated 4 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 5 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆53Updated 5 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71Updated 3 years ago
- Load Dll into Kernel space☆39Updated 3 years ago
- The tool can be used to eliminate redundant instructions in a basic block.☆81Updated 2 years ago
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆45Updated 3 years ago
- Proof-of-Concept software for detecting AV/EDR hooks in Windows libraries.☆36Updated 3 years ago