garzon / obfacros
obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.
☆46Updated 5 years ago
Alternatives and similar repositories for obfacros:
Users that are interested in obfacros are comparing it to the libraries listed below
- vmp2.x devirtualization☆68Updated 3 months ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆57Updated 3 years ago
- ☆49Updated last year
- VMProtectTest☆37Updated 2 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆69Updated 3 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆103Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆103Updated 2 years ago
- Rootkit & Anti-rootkit☆39Updated last year
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆46Updated 9 months ago
- 关于intel和amd指令行为不一样这件事☆60Updated 2 years ago
- ☆68Updated 2 years ago
- ☆20Updated 5 years ago
- intel vt-x hypervisor ept☆25Updated 4 years ago
- Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of v…☆54Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆68Updated 2 years ago
- Ida pro plugin. The antiVM aims to quickly identify anti-virtual machine and anti-sandbox behavior. This can speed up malware analysis.☆38Updated 2 years ago
- Helper script for Windows kernel debugging with IDA Pro on VMware + GDB stub (including PDB symbols)☆63Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- windows kernel pagehook☆38Updated 2 years ago
- Binary rewriter for 64-bit PE files.☆68Updated last year
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆37Updated 2 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104Updated 4 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆18Updated last year
- Using SetWindowHookEx for preinjected DLL's☆57Updated 2 years ago
- IDA Plugin that fills in missing indirect CALL & JMP target information☆122Updated last month
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago