kaftejiman / ejjaLinks
A modular Go source code level control flow obfuscator, made in Go.
☆37Updated 4 years ago
Alternatives and similar repositories for ejja
Users that are interested in ejja are comparing it to the libraries listed below
Sorting:
- Put sandbox detection to bed. Advanced sandbox detection and evasion for Golang.☆8Updated 3 years ago
- golang String Obfuscate☆9Updated 3 years ago
- PE file mapping and manipulation package.☆36Updated 3 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- Golang Simple Anti Debugger & Anti Http Debugger☆20Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆12Updated 2 years ago
- A collection of weaponized LPE exploits written in Go☆52Updated 4 months ago
- Golang wrapper for the Microsoft Antimalware Scan Interface (AMSI)☆11Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- Hides processes from the windows task manager using IAT hooking.☆19Updated 4 years ago
- ☆27Updated 3 years ago
- ☆54Updated 2 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆22Updated 5 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Updated 3 years ago
- Encrypt embedded go files using age.☆48Updated 3 years ago
- ☆62Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- ☆9Updated last year
- ☆26Updated 3 years ago
- ☆14Updated 2 years ago
- Offensive V Programming☆18Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Files for http://deniable.org/windows/windows-callbacks☆25Updated 4 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆17Updated 3 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Updated 3 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- ☆18Updated 3 years ago
- ComObject Shellcode Loader with fake return address☆12Updated 3 years ago