techtocore / Cpp-Guard
A platform independent C++ code obfuscator.
☆13Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cpp-Guard
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Simple driver loader for windows☆18Updated 4 years ago
- anti breakpoint using job objects in a simple way.☆12Updated 7 months ago
- working injector bp (BE EAC & VANGUARD)☆4Updated 3 years ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 3 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 4 years ago
- manual mapping injector☆26Updated 2 years ago
- x64 Windows privilege elevation using anycall☆20Updated 3 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 8 years ago
- Мутация PE x86☆15Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆14Updated 5 years ago
- This project demonstrating multiple protection and anti-analysis techniques, including self-modifying code.☆13Updated last year
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆16Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 3 years ago
- A specially crafted IOCTL can be issued to the rzpnk.sys driver in Razer Synapse 2.20.15.1104 that is forwarded to ZwOpenProcess allowing…☆12Updated 4 years ago
- A class to gather information about a process, its threads and modules.☆24Updated 4 years ago
- A Windows API hooking library !☆29Updated 2 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆15Updated 2 years ago
- Injector with kernel power☆16Updated 3 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆30Updated 5 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆10Updated 3 years ago
- ☆26Updated last year
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 3 years ago
- Bypass UAC by abusing shell protocol handlers☆13Updated 3 years ago