ollvm, based on llvm-clang 5.0.2, 6.0.1, 7.0.1, 8.0, 9.0, 9.0.1
☆19Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for obfuscator
Users that are interested in obfuscator are comparing it to the libraries listed below
Sorting:
- idk man this was the default github name☆35Apr 23, 2023Updated 2 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆70Sep 6, 2021Updated 4 years ago
- Code Integrity Violation Spotter☆17Jun 11, 2024Updated last year
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆26Apr 21, 2022Updated 3 years ago
- Decode the values of common Windows properties such as userAccountControl and sAMAccountType.☆24Oct 2, 2023Updated 2 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- You shall pass☆270Jul 16, 2022Updated 3 years ago
- Code snippets to add on top of cobalt strike sleepmask kit so that ekko can work in a CFG protected process☆49Mar 15, 2023Updated 2 years ago
- My implementation of Halo's Gate technique in C#☆54Apr 20, 2022Updated 3 years ago
- Overwrite a process's recovery callback and execute with WER☆102Apr 17, 2022Updated 3 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- POC for frustrating/defeating Malware Analysts☆156Jun 12, 2022Updated 3 years ago
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- It stinks☆105Apr 22, 2022Updated 3 years ago
- ☆26May 22, 2021Updated 4 years ago
- Finding Truth in the Shadows☆123Jan 26, 2023Updated 3 years ago
- PowerShell Obfuscation and Data Science☆180May 4, 2022Updated 3 years ago
- Detect strange memory regions and DLLs☆185Jan 20, 2022Updated 4 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- This is my own implementation of the Perun's Fart technique by Sektor7☆72May 14, 2022Updated 3 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆115Oct 21, 2023Updated 2 years ago
- ☆71Feb 6, 2025Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Event Masker is a Splunk streaming command to mask event from search based on a list of rules that contain conditions.☆16Oct 11, 2022Updated 3 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- A Proof of Concept Rootkit Demonstrating Keylogging and Virtual File System (VFS) Capabilities☆77Sep 21, 2022Updated 3 years ago
- Yet another variant of Process Hollowing☆458Jul 31, 2025Updated 7 months ago
- Patch AMSI and ETW in remote process via direct syscall☆84Apr 28, 2022Updated 3 years ago
- ☆11Oct 14, 2020Updated 5 years ago
- Experiment on reproducing Obfuscate & Sleep☆162Mar 14, 2021Updated 4 years ago
- The telegram bot provides basic subscription for premium (non telegram premium, only bot's own). Uses some telegram payment methods☆10Mar 30, 2023Updated 2 years ago