x86 PE Mutator
☆232Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for Milfuscator
Users that are interested in Milfuscator are comparing it to the libraries listed below
Sorting:
- X86 Mutation Engine with Portable Executable compatibility.☆536May 24, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆98Aug 27, 2022Updated 3 years ago
- Native code virtualizer for x64 binaries☆520Dec 20, 2024Updated last year
- PE (and elf now!) bin2bin obfuscator☆826Oct 11, 2025Updated 5 months ago
- x64 binary obfuscator☆1,960Jul 14, 2023Updated 2 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆94Sep 23, 2023Updated 2 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆271Aug 31, 2022Updated 3 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 5 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- DLL scatter manual mapper☆813Apr 10, 2021Updated 4 years ago
- Inline syscalls made easy for windows on clang☆736Jun 21, 2024Updated last year
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆279Nov 20, 2022Updated 3 years ago
- Analyze patches in a process☆260Jul 28, 2021Updated 4 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- Simple memory obfuscator.☆24Jul 21, 2022Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 3 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆41Jun 4, 2022Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆321Oct 13, 2024Updated last year
- Obfuscate specific windows apis with different apis☆1,022Feb 21, 2021Updated 5 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆250Jul 9, 2024Updated last year
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- Load your driver like win32k.sys☆258Aug 20, 2022Updated 3 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- a minimalistic windows hypervisor for amd processors☆146Jun 30, 2022Updated 3 years ago
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆663Jan 28, 2025Updated last year
- COFF and Portable Executable format described using standard C++ with no dependencies.☆344Apr 24, 2025Updated 10 months ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆1,077Oct 21, 2022Updated 3 years ago
- A repository of IDA Databases and Binaries used for the analysis of popular commercial virtual-machine obfuscators☆72Oct 7, 2022Updated 3 years ago