Obfuscate calls to imports by patching in stubs
☆72Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for ImportCallObfuscator
Users that are interested in ImportCallObfuscator are comparing it to the libraries listed below
Sorting:
- Analyze patches in a process☆259Jul 28, 2021Updated 4 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆93Sep 23, 2023Updated 2 years ago
- Fix VMProtect Import Protection☆371Aug 12, 2021Updated 4 years ago
- Tutorial on solving a VM based CrackMe.☆66Jul 23, 2020Updated 5 years ago
- Windows CIFS/SMB packet generation and SMB networking library☆12Aug 25, 2020Updated 5 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- X86/X64 Hardware Breakpoint Manager☆42Jun 18, 2021Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- ☆12Jun 30, 2019Updated 6 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- X86 Mutation Engine with Portable Executable compatibility.☆534May 24, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆121Feb 8, 2022Updated 4 years ago
- Simple Demo of using Windows Hypervisor Platform☆29Jul 14, 2025Updated 7 months ago
- An example code of CiGetCertPublisherName☆17Mar 24, 2022Updated 3 years ago
- ☆18Mar 28, 2023Updated 2 years ago
- A simple program to obfuscate code written in cpp.☆51May 9, 2024Updated last year
- Easily hook WIN32 x64 functions☆18Feb 19, 2025Updated last year
- ☆23Oct 28, 2020Updated 5 years ago
- detect hypervisor with Nmi Callback☆42Sep 25, 2022Updated 3 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Quick check of NT kernel exported&unexported functions/global variable offset NT内核导出以及未导出函数+全局变量偏移速查☆98Mar 30, 2023Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆96Nov 12, 2021Updated 4 years ago
- Demo to show how write ALPC Client & Server using native Ntdll.dll syscalls.☆21Jan 25, 2022Updated 4 years ago
- A mapper that maps shellcode into loaded large page drivers☆324Apr 26, 2022Updated 3 years ago
- Single-header, minimalistic, cross-platform hook library written in pure C☆377Jan 3, 2026Updated last month
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆11Sep 25, 2021Updated 4 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Dump PDB Symbols including support for Bochs Debugging Format (with wine support)☆14Aug 11, 2023Updated 2 years ago
- A simple process query/manipulation tool using driver hooked system call. (2019)☆12Aug 30, 2021Updated 4 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆20Dec 29, 2021Updated 4 years ago
- Shh0ya Kernel Hook Driver☆25Dec 8, 2020Updated 5 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆36Jun 25, 2019Updated 6 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆48Nov 2, 2022Updated 3 years ago
- ☆40Mar 23, 2023Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆71May 11, 2022Updated 3 years ago
- A bunch of parsers for PE and PDB formats in C++☆267May 15, 2024Updated last year
- Fixes the "Device\Nal is already in use" error on kdmapper.☆19Jan 9, 2023Updated 3 years ago