A platform independent C++ code obfuscator.
☆13Jul 20, 2019Updated 6 years ago
Alternatives and similar repositories for Cpp-Guard
Users that are interested in Cpp-Guard are comparing it to the libraries listed below
Sorting:
- Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)☆24May 20, 2021Updated 4 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Modern interface library based on MacOS.☆18Jan 28, 2025Updated last year
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆14Oct 9, 2023Updated 2 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- external cheat for csgo that doesnt write to memory.☆11Mar 3, 2023Updated 2 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- Manually maps a DLL & replaces a target process's entry point.☆22Mar 1, 2025Updated 11 months ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- Invoke-Decoder – A PowerShell script to decode/deobfuscate malware samples☆18Aug 2, 2020Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆18Aug 23, 2022Updated 3 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- ☆23Oct 15, 2024Updated last year
- A revamp of the good old NetSeal licensing system, with security !☆16Jun 15, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Minecraft 1.8.9 and 1.9.4 internal cheat☆13Feb 27, 2024Updated 2 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- read / write memory from a proxy process by injecting shellcode☆20Dec 23, 2025Updated 2 months ago
- Overwrites the whole PE Header☆20Apr 20, 2020Updated 5 years ago
- C++11/14 obfuscation techniques.☆42Nov 29, 2019Updated 6 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Jul 6, 2021Updated 4 years ago
- ☆17Jan 28, 2024Updated 2 years ago
- Moobot Botnet | Leaked version☆18Jan 11, 2021Updated 5 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- ☆21Apr 15, 2024Updated last year
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- A very weird RAT☆19Aug 11, 2022Updated 3 years ago
- Structured Bindings Pack - serialize C++ structs into MessagePack binary form☆21Nov 4, 2020Updated 5 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Jul 8, 2021Updated 4 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- legendware v4 src semi-fix $$$☆19Jul 2, 2024Updated last year
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago