killvxk / awesome-obfuscations
☆46Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-obfuscations
- A years-old exploit of a local EoP vulnerability in Kingsoft Antivirus KWatch Driver version 2009.3.17.77.☆36Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆41Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated last year
- Wow64 Heaven's Gate Hook☆26Updated 3 years ago
- Small handy tool for crafting shellcodes by hand.☆18Updated 2 years ago
- Yet another Windows DLL injector.☆38Updated 3 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆49Updated last year
- A simple program to obfuscate code written in cpp.☆46Updated 6 months ago
- Read Memory without ReadProcessMemory for Current Process☆74Updated 2 years ago
- A compact tool for detecting AV/EDR hooks in default Windows libraries.☆29Updated 2 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆20Updated last year
- manual mapping injector☆26Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆26Updated last year
- Load Dll into Kernel space☆38Updated 2 years ago
- Call 32bit NtDLL API directly from WoW64 Layer☆60Updated 4 years ago
- Binary Ninja plugin for automating VMProtect analysis☆57Updated last year
- windows kernel pagehook☆38Updated 2 years ago
- A kernel mode Windows rootkit in development.☆49Updated 2 years ago
- direct systemcalls with a modern c++20 interface.☆42Updated last year
- Subtract one PE file from another!☆19Updated 3 years ago
- devirtualization vmprotect☆61Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- WinHvShellcodeEmulator (WHSE) is a shellcode emulator leveraging the Windows Hypervisor Platform API☆19Updated 2 years ago
- obfacros - a set of C++ macros that can be used to obfuscate your c/c++ code, to make executables harder for reverse-engineering.☆45Updated 5 years ago
- Triton based symbolic emulator☆16Updated 2 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆18Updated 3 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆16Updated 3 years ago
- ollvm 4.0 using clang 10.0.1☆13Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆66Updated 2 years ago
- ☆32Updated 3 years ago