khaleghsalehi / COBFULinks
C/C++ Source Code Obfuscator
☆24Updated 2 years ago
Alternatives and similar repositories for COBFU
Users that are interested in COBFU are comparing it to the libraries listed below
Sorting:
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- A simple ransomware defender.It uses minifilter to filt "rewrite" and "delete" events in kernel.And it handles event in user mode.☆27Updated 7 years ago
- ☆72Updated 11 years ago
- Wow64 syscall hook☆41Updated 8 years ago
- unicorn emulator for x64dbg☆34Updated 7 years ago
- it can extract functions from .dll, .exe, .sys and it be work! :)☆39Updated 6 years ago
- An API Monitor based on Instrumentation☆44Updated 7 years ago
- HadesMem is a C++-based memory hacking library for Windows based applications, with the goal of providing a safe, generic, powerful, and …☆28Updated 10 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Updated 11 years ago
- OllyCallTrace is a plugin for OllyDbg to trace the call chain of a thread.☆53Updated 13 years ago
- Kernel debugger using Intel VT-x. Designed to be compatible with linux, ucore, windows.☆28Updated 12 years ago
- A command line tool to load and unload a device driver.☆47Updated 8 years ago
- ☆27Updated 9 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆54Updated 2 months ago
- ☆37Updated 10 years ago
- Plain project for usege with github/zer0mem/common.git☆48Updated 11 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Windows anti-rootkit library☆37Updated 10 years ago
- A python metamorphic engine for PE/PE+ files.☆15Updated 2 years ago
- A simple native code virtualizer for 32-bit Windows PE☆15Updated 9 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28Updated 7 years ago
- Analyze PatchGuard☆59Updated 7 years ago
- ☆33Updated 4 years ago
- ☆14Updated 8 years ago
- All materials related https://resources.infosecinstitute.com/tutorial-building-reverse-engineering-simple-virtual-machine-protection/☆56Updated 8 years ago
- Miscellaneous old Exploit code and PoCs☆16Updated 11 months ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- Use WinDBG to trace the Windows API calls of any Portable Executable file☆31Updated 8 years ago