nevergiveup-c / obfuscxxLinks
Header-only compile-time variables obfuscation library for C++20 and later. Compiler Support: MSVC (+WDM), Clang, GCC. Architecture Support: x86-64, ARM
☆60Updated this week
Alternatives and similar repositories for obfuscxx
Users that are interested in obfuscxx are comparing it to the libraries listed below
Sorting:
- Exploit vulnerabilities in NeacSafe64.sys to achieve privilege escalation and kernel-mode shellcode execution☆57Updated 5 months ago
- Forked LLVM focused on MSVC Compatibility. This version is designed for windows users☆127Updated 3 weeks ago
- PoC kernel to usermode injection☆90Updated last year
- Example driver on how to use SKLib☆62Updated last year
- A kernel injector for EAC and BE☆141Updated last year
- ☆124Updated 2 years ago
- Kernel Level NMI Callback Blocker☆135Updated 2 months ago
- Injecting dll to protected games using ioclt and code cave communications, works on eac, be protected games but made for fn☆101Updated last year
- A modern C++20 header-only library for advanced direct system call invocation.☆159Updated last week
- Unknowncheats Magically Optimized Tidy Mapper using nvaudio☆135Updated last year
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆82Updated 2 months ago
- A series of methods used to detect kernel shellcode for tencent game safe race 2024☆44Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆63Updated 2 months ago
- Use RTCore64 to map your driver on windows 11.☆139Updated 6 months ago
- A Kernel Driver that can be used for a cheat or malware base to circumvent common cache & structure table checks. PsLoadedModuleList howe…☆180Updated 2 months ago
- A method to Disable DSE using .data ptr hooks☆36Updated last year
- ☆84Updated last year
- Bypass detection from Flare-floss☆28Updated 2 years ago
- Windows driver mapper via the UEFI☆50Updated 4 months ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆30Updated 11 months ago
- Example of reading process memory through kernel special APC☆110Updated 2 years ago
- IDA Pro plugin AntiXorstr☆145Updated 9 months ago
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆164Updated 3 years ago
- An x86-64 code virtualizer for VM based obfuscation☆143Updated 11 months ago
- A library to assist with memory & code protection.☆65Updated last year
- VMP 3.X decrypt iat☆42Updated last year
- Load driver on boot before anti-cheats☆35Updated last year
- This is my EAC Bypass (Setup) Driver that offers an undetected communication and callback handler/hooking system through IOCTL.☆147Updated 2 months ago
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆76Updated last year
- Fluently detect security measures in software.☆32Updated last month