This repository contains D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
☆36Jan 22, 2021Updated 5 years ago
Alternatives and similar repositories for d-time
Users that are interested in d-time are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆117Aug 9, 2016Updated 9 years ago
- Mimikatz built as a static library.☆12Feb 9, 2022Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109May 27, 2021Updated 4 years ago
- Lightweight WINAPI tracing with Pin☆27Aug 22, 2019Updated 6 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Apr 19, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 四川大学教务系统chrome插件☆11Sep 19, 2019Updated 6 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- Bypass anti-virus with various method☆34Sep 23, 2023Updated 2 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- ☆11Jun 24, 2024Updated last year
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Headers for linking your software with ntdll.dll☆15Nov 4, 2020Updated 5 years ago
- clone of armadillo patched for windows☆49Oct 22, 2024Updated last year
- ☆31Jul 26, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆23Nov 22, 2021Updated 4 years ago
- My own version from "Writing a C Compiler" Book from NoStarchPress using C++ and LLVM libraries.☆36Mar 8, 2026Updated 2 weeks ago
- Proof of concepts demonstrating some aspects of the Windows kernel shadow stack mitigation.☆55Jun 2, 2025Updated 9 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75May 20, 2021Updated 4 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Library for using direct system calls☆35Jan 30, 2025Updated last year
- Monitor ETW events for Windows process mitigation policies, with stack traces☆31Oct 7, 2022Updated 3 years ago
- win32/x64 obfuscate framework☆33Apr 16, 2019Updated 6 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Dec 16, 2020Updated 5 years ago
- Command line utility that executes a command (plaintext or encryted) as another user account or under specified user session☆18Jun 6, 2019Updated 6 years ago
- An AVX Lifter for the Hex-Rays Decompiler + new instructions☆11Oct 14, 2022Updated 3 years ago
- Framework to automate working with AST in IDA Pro☆74Apr 3, 2024Updated last year
- Python interface for Binexport, the Bindiff export format☆21Mar 16, 2026Updated last week
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- ☆58Feb 27, 2026Updated 3 weeks ago
- ☆18Nov 7, 2024Updated last year
- libemu shim layer and win32 environment for Unicorn Engine☆73Apr 14, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Manual PE image mapper☆66Aug 29, 2013Updated 12 years ago
- windows rootkit☆60May 2, 2024Updated last year
- shadow tls☆17Nov 13, 2022Updated 3 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Easily access open source food and nutritional data from the USDA.☆10Mar 17, 2018Updated 8 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago