Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
☆661Feb 7, 2026Updated last month
Alternatives and similar repositories for Obfusk8
Users that are interested in Obfusk8 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- x64 binary obfuscator☆1,961Jul 14, 2023Updated 2 years ago
- Native code virtualizer for x64 binaries☆520Dec 20, 2024Updated last year
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆986Aug 19, 2024Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆120Oct 19, 2025Updated 5 months ago
- PE (and elf now!) bin2bin obfuscator☆831Oct 11, 2025Updated 5 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An x86-64 Code Virtualizer☆311Sep 26, 2024Updated last year
- protector & obfuscator & code virtualizer☆708Updated this week
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆797Updated this week
- An example reference design for a proposed BOF PE☆204Jan 23, 2026Updated 2 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆608Feb 2, 2026Updated last month
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 10 months ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆554Nov 12, 2022Updated 3 years ago
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆437Oct 8, 2025Updated 5 months ago
- A Mythic Agent written in PIC C.☆206Feb 4, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kernel Level NMI Callback Blocker☆168Sep 27, 2025Updated 5 months ago
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆272Jun 18, 2025Updated 9 months ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆94Oct 27, 2025Updated 4 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆142Aug 13, 2025Updated 7 months ago
- Polaris: An LLVM-based obfuscator that protects software at various levels☆481Oct 4, 2025Updated 5 months ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆267Oct 16, 2024Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆236Jan 24, 2025Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆928Jul 20, 2024Updated last year
- A x86_64 software emulator☆162Aug 25, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- A cross-platform C++ framework for building Windows shellcode☆163Mar 4, 2026Updated 3 weeks ago
- ☆391Jun 13, 2025Updated 9 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆117Oct 30, 2025Updated 4 months ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆527Feb 15, 2026Updated last month
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,908Aug 3, 2023Updated 2 years ago
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆559Apr 8, 2025Updated 11 months ago
- Header-only C++ library for producing PE files.☆36Jun 17, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reverse engineering winapi function loadlibrary.☆238Apr 17, 2023Updated 2 years ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆787Jan 26, 2026Updated last month
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated 11 months ago
- remote process injections using pool party techniques☆70Jun 29, 2025Updated 8 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆111Feb 18, 2024Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆25May 7, 2025Updated 10 months ago