x86 PE Mutator
☆233Dec 24, 2022Updated 3 years ago
Alternatives and similar repositories for Milfuscator
Users that are interested in Milfuscator are comparing it to the libraries listed below
Sorting:
- X86 Mutation Engine with Portable Executable compatibility.☆534May 24, 2022Updated 3 years ago
- ☆192Dec 8, 2021Updated 4 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆99Aug 27, 2022Updated 3 years ago
- C++ library for parsing and manipulating PE files statically and dynamically.☆93Sep 23, 2023Updated 2 years ago
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- x64 binary obfuscator☆1,958Jul 14, 2023Updated 2 years ago
- PE (and elf now!) bin2bin obfuscator☆815Oct 11, 2025Updated 4 months ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆268Aug 31, 2022Updated 3 years ago
- x64 PE-COFF virtualization driven obfuscation engine☆58Oct 14, 2022Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Analyze patches in a process☆259Jul 28, 2021Updated 4 years ago
- compile-time control flow obfuscation using mba☆199Jul 4, 2023Updated 2 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Mar 11, 2021Updated 4 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆249Jul 9, 2024Updated last year
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- kernel driver used to monitor the activity of BadlionAnticheat.sys by patching its IAT☆32Jul 9, 2021Updated 4 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- Read Memory without ReadProcessMemory for Current Process☆92Feb 13, 2022Updated 4 years ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆550Nov 12, 2022Updated 3 years ago
- Inline syscalls made easy for windows on clang☆736Jun 21, 2024Updated last year
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Mar 10, 2023Updated 2 years ago
- Small PoC of using a Microsoft signed executable as a lolbin.☆141Feb 27, 2023Updated 3 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆317Oct 13, 2024Updated last year
- Hex-Rays microcode plugin for automated simplification of Windows Kernel decompilation.☆657Jan 28, 2025Updated last year
- DLL scatter manual mapper☆811Apr 10, 2021Updated 4 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆365Aug 18, 2022Updated 3 years ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆780Apr 10, 2024Updated last year
- ☆47Feb 27, 2022Updated 4 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆278Nov 20, 2022Updated 3 years ago
- CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM☆163Dec 24, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- Universal x86/x64 VMProtect 2.0-3.X Import fixer☆20Dec 29, 2021Updated 4 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- PAGE_GUARD based hooking library☆52Jul 25, 2022Updated 3 years ago
- Debugger Anti-Detection Benchmark☆382Jan 11, 2026Updated last month
- Kernel DLL Injector using NX Bit Swapping and VAD hide for hiding injected DLL☆219Nov 12, 2020Updated 5 years ago
- A C compiler targeting an artistically pleasing nightmare for reverse engineers☆1,075Oct 21, 2022Updated 3 years ago