jnastarot / fukutasmLinks
(shard of furikuri project) assambler for code obfuscation
☆18Updated 5 years ago
Alternatives and similar repositories for fukutasm
Users that are interested in fukutasm are comparing it to the libraries listed below
Sorting:
- MouHidInputHook enables users to filter, modify, and inject mouse input data packets into the input data stream of HID USB mouse devices …☆10Updated 5 years ago
- Some crazy PE executables protection kernel driver☆18Updated 5 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- Remote memory library in C++17.☆31Updated 7 years ago
- ☆11Updated 7 years ago
- x64 Kernel Hooks Detection☆24Updated 8 years ago
- x64 assembler library☆31Updated 11 months ago
- ☆10Updated 5 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Updated 4 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- fork HoShiMin Avanguard☆19Updated 6 years ago
- hooking KiUserApcDispatcher☆24Updated 8 years ago
- Basic Injector running on x64 machines that is able to load into x64 AND x86 processes☆21Updated 6 years ago
- Translates WinDbg "dt" structure dump to a C structure☆13Updated 4 years ago
- Basic utilities for executing, reading and writing 64-bit data in a 32-bit WoW64 process☆17Updated 2 years ago
- ☆14Updated 12 years ago
- Static library and headers for linking your software with ntdll.dll☆32Updated 5 years ago
- Shareds for kernel developement☆28Updated 11 years ago
- Native file compressor using only the ntdll.dll☆9Updated 7 years ago
- A stack and register based virtual machine which can compile and execute arbitrary code in runtime☆44Updated 2 months ago
- RET / JMP RBX call spoofer☆10Updated 5 years ago
- Ready-to-use headers for Windows Kernel SSDT indices☆11Updated 5 years ago
- ☆32Updated 6 years ago
- use crystalCPUID to identify vt-x & amd-v☆17Updated 10 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago
- ☆15Updated 4 years ago
- Map memory to user space and manipulate user memory, using capmon☆23Updated 6 years ago
- Library for using direct system calls☆35Updated 4 months ago
- Windows Console Monitor☆34Updated 5 years ago