k4yt3x / InstantSuspendLinks
Instantly suspend processes to bypass kernel driver protections.
☆20Updated last year
Alternatives and similar repositories for InstantSuspend
Users that are interested in InstantSuspend are comparing it to the libraries listed below
Sorting:
- LLVM based obfuscation engine☆109Updated 7 months ago
- ☆73Updated 5 months ago
- ANY.RUN sandbox detection collection☆22Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- merge rust-lang's llvm and KomiMoe's Arkari (llvm) to produce obfuscated llvm for rustc☆36Updated 2 weeks ago
- vm_str.hpp is a header only string obfuscator.☆101Updated 4 months ago
- ☆12Updated 3 years ago
- Rust bindings for VMProtect.☆26Updated last year
- Usermode NT Explorer - Query kernel addresses, translate virtual to physical addresses, inspect the PFN database, and more.☆50Updated last week
- Rust implementation of lazy_importer☆58Updated 2 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Updated 9 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Ryūjin Protector - Is a Intel Arch - BIN2BIN - PE Obfuscation/Protection/DRM tool☆284Updated 2 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆92Updated 6 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆130Updated 3 weeks ago
- Safe Rust bindings for the COM interfaces of the Windows debugging engine☆15Updated 2 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆110Updated last year
- Scan for potentially vulnerable drivers☆94Updated 3 years ago
- ☆39Updated 2 years ago
- Enumerate Callbacks and all Object Types☆12Updated 3 years ago
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆68Updated 3 weeks ago
- Exploiting the KsecDD Windows driver through Server Silos☆73Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35Updated 2 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Updated 8 months ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25Updated last year
- Implementation of sllvm obfuscator☆66Updated 3 years ago
- Finding Truth in the Shadows☆120Updated 2 years ago
- 整合Pluto-Obfuscator和goron部分混淆,移植到LLVM-16.0.x,使用NewPassManager☆133Updated 2 years ago
- using wnbios64.sys for arbitrary r/w☆15Updated 3 months ago