weak1337 / AlcatrazLinks
x64 binary obfuscator
☆1,939Updated 2 years ago
Alternatives and similar repositories for Alcatraz
Users that are interested in Alcatraz are comparing it to the libraries listed below
Sorting:
- x64 Dynamic Reverse Engineering Toolkit☆724Updated 2 years ago
- Kernel Driver Utility☆2,353Updated 3 weeks ago
- PE (and elf now!) bin2bin obfuscator☆803Updated 3 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,261Updated last year
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆932Updated 3 years ago
- Now You See Me, Now You Don't☆1,010Updated last week
- protector & obfuscator & code virtualizer☆662Updated this week
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,875Updated 2 years ago
- A Pin Tool for tracing API calls etc☆1,595Updated last month
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,188Updated 3 years ago
- Converts a EXE into DLL☆1,355Updated 3 months ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,230Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,144Updated 4 years ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,994Updated 3 years ago
- Win32 and Kernel abusing techniques for pentesters☆971Updated 2 years ago
- The BEST DLL Injector Library.☆1,293Updated 7 months ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆771Updated last year
- Obfuscate specific windows apis with different apis☆1,016Updated 4 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆648Updated 2 years ago
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆548Updated 2 years ago
- Native API header files for the System Informer project.☆1,314Updated 7 months ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆934Updated 4 years ago
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆804Updated 4 years ago
- A bunch of Windows anti-debugging tricks for x86 and x64.☆802Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,773Updated 3 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,312Updated 2 months ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,259Updated last year
- A modern 32/64-bit position independent implant template☆1,279Updated 9 months ago
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆580Updated 5 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,182Updated last month