Yet another LLVM-based obfuscator
☆126Sep 3, 2024Updated last year
Alternatives and similar repositories for limoncello
Users that are interested in limoncello are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆107Mar 15, 2021Updated 5 years ago
- A collection of LLVM passes for obfuscating☆42Mar 9, 2023Updated 3 years ago
- PDB Rewriting Rust Library☆29Apr 26, 2024Updated 2 years ago
- Kernel-mode Paravirtualization in Ring 2, LLVM based linker, and some other things!☆427Apr 19, 2025Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆325Jan 17, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Native code virtualizer for x64 binaries☆528Dec 20, 2024Updated last year
- RISC-V Virtual Machine☆288Jun 10, 2025Updated 10 months ago
- Efficient general mixed boolean-arithmetic (MBA) simplifier☆128Apr 22, 2026Updated last week
- ☆108Aug 21, 2024Updated last year
- Polaris: An LLVM-based obfuscator that protects software at various levels☆501Oct 4, 2025Updated 6 months ago
- A basic implementation of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆78Mar 29, 2025Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆79Aug 5, 2024Updated last year
- macOS kext with kernel R/W, kalloc and kcall☆108Jun 21, 2025Updated 10 months ago
- ☆20Aug 29, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆203Jun 17, 2025Updated 10 months ago
- A set of programs for analyzing common vulnerabilities in COM☆253Sep 8, 2024Updated last year
- Section-based payload obfuscation technique for x64☆64Aug 8, 2024Updated last year
- Converted phnt (Native API header files from the System Informer project) to IDA TIL, IDC (Hex-Rays).☆169Aug 23, 2024Updated last year
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆268Oct 16, 2024Updated last year
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- An x86-64 Code Virtualizer☆316Sep 26, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- ☆100Sep 1, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- In-memory hiding technique☆64Jan 5, 2025Updated last year
- Kernel driver for detecting Intel VT-x hypervisors.☆200Jul 11, 2023Updated 2 years ago
- Implementation of sllvm obfuscator☆66Nov 5, 2022Updated 3 years ago
- Sleep obfuscation☆273Dec 13, 2024Updated last year
- An example reference design for a proposed BOF PE☆206Jan 23, 2026Updated 3 months ago
- This IDA plugin extends the functionality of the assembly and hex view. With this plugin, you can conveniently decode/decrypt/alter data …☆87May 31, 2025Updated 11 months ago
- LLVM based "VM" obfuscator☆152Apr 20, 2021Updated 5 years ago
- Using Windows' own bootloader as a shim to bypass Secure Boot☆235Jul 17, 2024Updated last year
- Dll injection through code page id modification in registry. Based on jonas lykk research☆16Jun 18, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Evasion by machine code de-optimization.☆425Jul 22, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 5 months ago
- Create stealthy, inline, EPT-like hooks using SMAP and SMEP☆63Oct 19, 2024Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆284Sep 18, 2024Updated last year
- Finding Truth in the Shadows☆127Jan 26, 2023Updated 3 years ago
- Rust bindings to the System Informer's (formerly known as Process Hacker) "phnt" native Windows headers☆51Jun 1, 2025Updated 11 months ago
- A set of LLVM and GCC based plugins that perform code obfuscation.☆141Oct 20, 2025Updated 6 months ago