This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
☆36Jan 22, 2021Updated 5 years ago
Alternatives and similar repositories for d-time
Users that are interested in d-time are comparing it to the libraries listed below
Sorting:
- ☆117Aug 9, 2016Updated 9 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- Bypass anti-virus with various method☆34Sep 23, 2023Updated 2 years ago
- clone of armadillo patched for windows☆48Oct 22, 2024Updated last year
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- ☆11Jun 24, 2024Updated last year
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆54Jun 2, 2025Updated 9 months ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- My own version from "Writing a C Compiler" Book from NoStarchPress using C++ and LLVM libraries.☆32Feb 27, 2026Updated last week
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Python interface for Binexport, the Bindiff export format☆20Feb 27, 2026Updated last week
- Example payload for CVE-2022-21894☆15Sep 27, 2023Updated 2 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Manual PE image mapper☆66Aug 29, 2013Updated 12 years ago
- A driver that supports communication between a Windows guest and HyperWin☆15Jan 6, 2021Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- A collection of insightful projects for Windows.☆19Sep 30, 2016Updated 9 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Microsoft Redistributable Download & Installer☆18Oct 14, 2019Updated 6 years ago
- Hactivation via MobileGestalt POC☆29Nov 15, 2025Updated 3 months ago
- Framework to automate working with AST in IDA Pro☆74Apr 3, 2024Updated last year
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- ☆21Sep 6, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- ☆15Dec 16, 2020Updated 5 years ago
- Re-implementation of Apple's Continuity Protocol☆19Dec 5, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Undocumented NsiAllocateAndGetTable usage in GetTcpTableInternal reverse engineered on Win7 X64☆20Apr 7, 2018Updated 7 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated 10 months ago