killvxk / awesome-obfuscations
☆48Updated 11 months ago
Alternatives and similar repositories for awesome-obfuscations:
Users that are interested in awesome-obfuscations are comparing it to the libraries listed below
- Wow64 Heaven's Gate Hook☆28Updated 3 years ago
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆47Updated 8 months ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- ☆33Updated 3 years ago
- 参考taviso的代码逆向一下mpengine.dll☆19Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- devirtualization vmprotect☆61Updated last year
- A kernel mode Windows rootkit in development.☆49Updated 3 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- ☆12Updated 3 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆30Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆26Updated last year
- Call NtCreateUserProcess directly as normal.☆69Updated 2 years ago
- Disassembler for Zeus VM custom instruction set☆27Updated 11 months ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- Binary Ninja plugin for automating VMProtect analysis☆58Updated 2 years ago
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆23Updated 2 years ago
- Native API header files for the Process Hacker project (nightly).☆25Updated this week
- Triton based symbolic emulator☆16Updated 2 years ago
- Record & prevent file deletion in kernel mode☆41Updated 4 years ago
- manual mapping injector☆28Updated 2 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆46Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- a code virtualizer based on angr☆29Updated 2 years ago
- virtualization obfuscator inspired by juhajong/vm-obfuscator☆57Updated 5 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆75Updated 2 years ago