Obfuscate calls to imports by patching in stubs
☆72Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for ImportCallObfuscator
Users that are interested in ImportCallObfuscator are comparing it to the libraries listed below
Sorting:
- Analyze patches in a process☆260Jul 28, 2021Updated 4 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆94Sep 23, 2023Updated 2 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- Fix VMProtect Import Protection☆371Aug 12, 2021Updated 4 years ago
- Tutorial on solving a VM based CrackMe.☆66Jul 23, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆536May 24, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 3 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated 11 months ago
- Header only library for obfuscation import winapi functions.☆43Feb 12, 2025Updated last year
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- ROOT AKA BEZNOGIY :(☆19Oct 21, 2021Updated 4 years ago
- ☆12Jun 30, 2019Updated 6 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Modmap updated to work on Windows 11☆28Jul 30, 2021Updated 4 years ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- Register a callback in Kernel from a manually mapped driver☆47Jun 1, 2021Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 8 months ago
- ☆18Mar 28, 2023Updated 2 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- A mini anti-anti debug hooking library for Windows.☆106Jan 3, 2021Updated 5 years ago
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- direct systemcalls with a modern c++20 interface.☆45Jan 6, 2023Updated 3 years ago
- ☆23Oct 28, 2020Updated 5 years ago
- C++ implementation of compile time obfuscator☆173Jul 23, 2019Updated 6 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- Based on physmeme☆74Apr 30, 2022Updated 3 years ago
- Single-header, minimalistic, cross-platform hook library written in pure C☆380Jan 3, 2026Updated 2 months ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Mar 7, 2026Updated 2 weeks ago
- Some usefull info when reverse engineering Kernel Mode Anti-Cheat☆78Feb 20, 2023Updated 3 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- bypass vmp virtual machine detect☆146Aug 5, 2022Updated 3 years ago