weak1337 / Alcatraz
x64 binary obfuscator
☆1,794Updated last year
Alternatives and similar repositories for Alcatraz:
Users that are interested in Alcatraz are comparing it to the libraries listed below
- x64 Dynamic Reverse Engineering Toolkit☆633Updated last year
- Kernel Driver Utility☆2,078Updated 4 months ago
- PE bin2bin obfuscator☆654Updated last month
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,882Updated 2 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,159Updated 11 months ago
- protector & obfuscator & code virtualizer☆511Updated this week
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,725Updated last year
- Run a Exe File (PE Module) in memory (like an Application Loader)☆884Updated 4 years ago
- A bunch of Windows anti-debugging tricks for x86 and x64.☆780Updated 3 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆884Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,397Updated last month
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,099Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,202Updated 10 months ago
- Inline syscalls made easy for windows on clang☆696Updated 9 months ago
- A static devirtualizer for VMProtect x64 3.x. powered by VTIL.☆2,001Updated 3 years ago
- Obfuscate specific windows apis with different apis☆997Updated 4 years ago
- Converts a EXE into DLL☆1,294Updated last year
- A dynamic VMP dumper and import fixer, powered by VTIL.☆1,205Updated 4 years ago
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆496Updated last year
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆734Updated 3 years ago
- Playing with the VMProtect software protection. Automatic deobfuscation of pure functions using symbolic execution and LLVM.☆1,221Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,015Updated 3 years ago
- Hypervisor based anti anti debug plugin for x64dbg☆1,354Updated 8 months ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆555Updated 3 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,073Updated last year
- Win32 and Kernel abusing techniques for pentesters☆945Updated last year
- Titan is a VMProtect devirtualizer☆19Updated last year
- Hiding kernel-driver for x86/x64.☆2,233Updated last month
- Converts PE into a shellcode☆2,498Updated last year
- Dumping processes using the power of kernel space !☆1,007Updated last year