Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
☆642Feb 7, 2026Updated 3 weeks ago
Alternatives and similar repositories for Obfusk8
Users that are interested in Obfusk8 are comparing it to the libraries listed below
Sorting:
- x64 binary obfuscator☆1,960Jul 14, 2023Updated 2 years ago
- Native code virtualizer for x64 binaries☆517Dec 20, 2024Updated last year
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆978Aug 19, 2024Updated last year
- PE (and elf now!) bin2bin obfuscator☆820Oct 11, 2025Updated 4 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆606Feb 2, 2026Updated last month
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Oct 19, 2025Updated 4 months ago
- An x86-64 Code Virtualizer☆309Sep 26, 2024Updated last year
- An example reference design for a proposed BOF PE☆200Jan 23, 2026Updated last month
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆772Sep 29, 2025Updated 5 months ago
- protector & obfuscator & code virtualizer☆686Updated this week
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆550Nov 12, 2022Updated 3 years ago
- A Mythic Agent written in PIC C.☆207Feb 4, 2025Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆228Jan 24, 2025Updated last year
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆270Jun 18, 2025Updated 8 months ago
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆434Oct 8, 2025Updated 4 months ago
- Macro-header for compile-time C obfuscation (tcc, win x86/x64)☆1,579Feb 14, 2026Updated 2 weeks ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- Header-only C++ library for producing PE files.☆36Jun 17, 2023Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆557Apr 8, 2025Updated 10 months ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆261Oct 16, 2024Updated last year
- A modern Rust implementation of the original Stardust project, providing a sophisticated 32/64-bit shellcode template that features posit…☆59Mar 17, 2025Updated 11 months ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆515Feb 15, 2026Updated 2 weeks ago
- PoC Implementation of a fully dynamic call stack spoofer☆922Jul 20, 2024Updated last year
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 9 months ago
- Collect Windows telemetry for Maldev☆460Jan 30, 2026Updated last month
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- A set of LLVM and GCC based plugins that perform code obfuscation.☆140Oct 20, 2025Updated 4 months ago
- Windows rootkit designed to work with BYOVD exploits☆216Jan 18, 2025Updated last year
- ☆390Jun 13, 2025Updated 8 months ago
- A x86_64 software emulator☆162Aug 25, 2025Updated 6 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆110Feb 18, 2024Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆233Apr 17, 2023Updated 2 years ago
- Polaris: An LLVM-based obfuscator that protects software at various levels☆466Oct 4, 2025Updated 5 months ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆642Jan 23, 2025Updated last year
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- Cobaltstrike Reflective Loader with Synthetic Stackframe☆186Jan 17, 2026Updated last month
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆779Jan 26, 2026Updated last month
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆382Dec 13, 2024Updated last year
- Shellcode loader that executes embedded Lua from Rust.☆128Dec 16, 2024Updated last year