tux3 / DittoLinks
Generic Metamorphic/Substitution Engine
☆30Updated 11 years ago
Alternatives and similar repositories for Ditto
Users that are interested in Ditto are comparing it to the libraries listed below
Sorting:
- A C polymorphic and metamorphic engine☆70Updated 6 years ago
- Collection Of Anti-Debugging Tricks☆101Updated 9 years ago
- metamorphic engine in python☆35Updated 8 years ago
- Bootkits Revisited☆40Updated 11 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Updated 5 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆64Updated 12 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆95Updated 8 years ago
- Simple standalone bundle of NT core APIs☆27Updated 9 years ago
- Code Morphing pass for LLVM☆25Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 10 years ago
- ☆80Updated 7 years ago
- library, which help to describe or load and execute PE files.☆54Updated 12 years ago
- ☆117Updated 12 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆54Updated last month
- simple PE packer written in C++☆55Updated 7 years ago
- TLB Splitting with intel vt-d and KVM☆21Updated 7 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 12 years ago
- nyā☆72Updated 9 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Updated 4 years ago
- MIR-Engine☆24Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- PE Infector/Cryptor source code☆20Updated 3 years ago
- ☆72Updated 11 years ago
- Hypervisor based tool for monitoring system register accesses.☆147Updated 6 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆84Updated 14 years ago
- Bypass User Account Control by manipulating tokens☆34Updated 7 years ago
- x64 usermode rootkit☆206Updated 7 years ago
- A tool to monitor how a target process modifies other processes☆25Updated 7 years ago