tux3 / DittoLinks
Generic Metamorphic/Substitution Engine
☆30Updated 11 years ago
Alternatives and similar repositories for Ditto
Users that are interested in Ditto are comparing it to the libraries listed below
Sorting:
- A C polymorphic and metamorphic engine☆72Updated 6 years ago
- metamorphic engine in python☆35Updated 9 years ago
- Collection Of Anti-Debugging Tricks☆101Updated 10 years ago
- Examples for detection of hidden processes on windows☆35Updated 11 years ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- Bypass User Account Control by manipulating tokens☆34Updated 8 years ago
- Library for kernel and user mode splicing for Windows (x86 and x64).☆64Updated 13 years ago
- Class implementation of PowerLoader injection technique☆32Updated 9 years ago
- MIR-Engine☆24Updated 8 years ago
- MSI NTIOLib/WinIO Local Privilege Escalation exploit☆96Updated 9 years ago
- simple PE packer written in C++☆56Updated 7 years ago
- Code Morphing pass for LLVM☆25Updated 9 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆65Updated 13 years ago
- Intermediate x86 instruction representation for use in obfuscation/deobfuscation.☆60Updated 5 months ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- deprecated☆27Updated 6 years ago
- Decrement Windows Kernel for fun and profit☆38Updated 7 years ago
- A library for intercepting native functions by hooking KiFastSystemCall☆74Updated 5 years ago
- Bootkits Revisited☆40Updated 11 years ago
- RVDbg is a debugger/exception handler for Windows processes and has the capability to circumvent anti-debugging techniques. (Cleaner, doc…☆72Updated 5 years ago
- PE Infector/Cryptor source code☆20Updated 3 years ago
- An obfuscation engine which obfuscates Intel x86 32-bit binary code.☆55Updated 7 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago
- PE file manipulation library.☆64Updated 5 years ago
- A tool to monitor how a target process modifies other processes☆25Updated 8 years ago
- nyā☆69Updated 10 years ago
- Virtualization detection through speculative execution PoCs and papers☆69Updated 7 years ago
- Windows kernel-mode callbacks tutorial driver☆47Updated 9 years ago