weak1337 / AlcatrazLinks
x64 binary obfuscator
☆1,919Updated 2 years ago
Alternatives and similar repositories for Alcatraz
Users that are interested in Alcatraz are comparing it to the libraries listed below
Sorting:
- x64 Dynamic Reverse Engineering Toolkit☆715Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆928Updated 3 years ago
- PE bin2bin obfuscator☆791Updated last month
- Hook system calls on Windows by using Kaspersky's hypervisor☆1,253Updated last year
- Now You See Me, Now You Don't☆994Updated last week
- A Pin Tool for tracing API calls etc☆1,571Updated 2 weeks ago
- Thread Stack Spoofing - PoC for an advanced In-Memory evasion technique allowing to better hide injected shellcode's memory allocation fr…☆1,176Updated 3 years ago
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,978Updated 3 years ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,846Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆969Updated 2 years ago
- Kernel Driver Utility☆2,293Updated 3 weeks ago
- protector & obfuscator & code virtualizer☆654Updated last week
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆645Updated 2 years ago
- Converts a EXE into DLL☆1,347Updated 2 months ago
- Original C Implementation of the Hell's Gate VX Technique☆1,125Updated 4 years ago
- Run a Exe File (PE Module) in memory (like an Application Loader)☆931Updated 4 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,214Updated last year
- A bunch of Windows anti-debugging tricks for x86 and x64.☆795Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,761Updated 3 years ago
- Compile-time, Usermode + Kernelmode, safe and lightweight string crypter library for C++11+☆788Updated 4 years ago
- A modern 32/64-bit position independent implant template☆1,267Updated 8 months ago
- Native API header files for the System Informer project.☆1,288Updated 6 months ago
- Shoggoth: Asmjit Based Polymorphic Encryptor☆759Updated last year
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆539Updated 2 years ago
- Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)☆554Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,258Updated last year
- Inline syscalls made easy for windows on clang☆727Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆860Updated last year
- Obfuscate specific windows apis with different apis☆1,017Updated 4 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,302Updated 3 weeks ago