This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
☆36Jan 22, 2021Updated 5 years ago
Alternatives and similar repositories for d-time
Users that are interested in d-time are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆118Aug 9, 2016Updated 9 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆108May 27, 2021Updated 4 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 四川大学教务系统chrome插件☆11Sep 19, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Bypass anti-virus with various method☆34Sep 23, 2023Updated 2 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- Windows Filtering Platform Driver for Outbound TCP Traffic Inspection and Filtering☆12Feb 11, 2024Updated 2 years ago
- ☆11Jun 24, 2024Updated last year
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- clone of armadillo patched for windows☆49Oct 22, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- My own version from "Writing a C Compiler" Book from NoStarchPress using C++ and LLVM libraries.☆38Mar 21, 2026Updated 3 weeks ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆54Jun 2, 2025Updated 10 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 7 years ago
- Use to generate DLL through Visual Studio☆19Jul 24, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆15Dec 16, 2020Updated 5 years ago
- Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session☆18Jun 6, 2019Updated 6 years ago
- An AVX Lifter for the Hex-Rays Decompiler + new instructions☆11Oct 14, 2022Updated 3 years ago
- Framework to automate working with AST in IDA Pro☆74Apr 3, 2024Updated 2 years ago
- Python interface for Binexport, the Bindiff export format☆22Apr 8, 2026Updated last week
- ☆19Nov 7, 2024Updated last year
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 9 years ago
- Manual PE image mapper☆67Aug 29, 2013Updated 12 years ago
- ☆59Feb 27, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Easily access open source food and nutritional data from the USDA.☆10Mar 17, 2018Updated 8 years ago
- Virtual Machine Introspection (VMI) for memory forensics and machine-learning.☆29Jun 2, 2025Updated 10 months ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- PoC for obfuscating the dynamic symbol table injecting a custom Hash Table to do symbol resolution☆30Sep 10, 2020Updated 5 years ago