Code Morphing pass for LLVM
☆24Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for code-morphing
Users that are interested in code-morphing are comparing it to the libraries listed below
Sorting:
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- LLVM pass that detects one undefined behavior, and emits code to delete your hard drive☆35Aug 8, 2020Updated 5 years ago
- Dynamic loading library for C/C++☆23Feb 24, 2023Updated 3 years ago
- Virtual machine with a custom instruction set in C☆16Jul 17, 2018Updated 7 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Obfuscator based on logic-bombs☆68May 9, 2020Updated 5 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆76Nov 12, 2019Updated 6 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- based on llvm 5.0.1 release with ollvm☆37Feb 12, 2018Updated 8 years ago
- Windows handle stealing POC with NtDuplicateObject☆41May 7, 2017Updated 8 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Mar 10, 2015Updated 11 years ago
- Collection of various llvm passes☆131Jun 2, 2015Updated 10 years ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- PE permutation library☆277Apr 8, 2023Updated 2 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- Contains some tricks to detect Sandboxes and gradually completed☆44Aug 27, 2017Updated 8 years ago
- x86/x64 manual mapping injector using the JUCE library☆89Jun 29, 2020Updated 5 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- oneHookLibraryIOS☆11Dec 29, 2020Updated 5 years ago
- ☆13Dec 27, 2019Updated 6 years ago
- AArch64 assembler/disassembler support☆11Sep 7, 2017Updated 8 years ago
- IDA Pro plug-in to fix/extract/view RTTI information☆11Jan 23, 2018Updated 8 years ago
- Dynamic Taint Analysis versus Obfuscated Self-Checking☆16Sep 5, 2021Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Various Cryptographic-Related Formulae☆17Jan 12, 2025Updated last year
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆34Mar 13, 2017Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- 代码虚拟化与自动化分析☆64Nov 25, 2017Updated 8 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- 🐧 A simple kernel-level rootkit☆21Mar 1, 2016Updated 10 years ago