Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries
☆673Mar 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for Obfusk8
Users that are interested in Obfusk8 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- x64 binary obfuscator☆1,968Jul 14, 2023Updated 2 years ago
- Native code virtualizer for x64 binaries☆522Dec 20, 2024Updated last year
- Obfusheader.h is a portable header file for C++14 compile-time obfuscation.☆987Aug 19, 2024Updated last year
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆123Oct 19, 2025Updated 5 months ago
- PE (and elf now!) bin2bin obfuscator☆837Oct 11, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An x86-64 Code Virtualizer☆312Sep 26, 2024Updated last year
- protector & obfuscator & code virtualizer☆712Updated this week
- Deobfuscation via optimization with usage of LLVM IR and parsing assembly.☆812Updated this week
- An example reference design for a proposed BOF PE☆205Jan 23, 2026Updated 2 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆615Feb 2, 2026Updated 2 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 10 months ago
- This tool will allow you to spoof the return addresses of your functions as well as system functions.☆560Nov 12, 2022Updated 3 years ago
- A Mythic Agent written in PIC C.☆203Feb 4, 2025Updated last year
- C++ 20 Control Flow Obfuscation library for Windows Binaries☆439Oct 8, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Run native PE or .NET executables entirely in-memory. Build the loader as an .exe or .dll—DllMain is Cobalt Strike UDRL-compatible☆274Jun 18, 2025Updated 9 months ago
- Kernel Level NMI Callback Blocker☆169Sep 27, 2025Updated 6 months ago
- A Windows PE packer for executables (x64) with LZMA compression and with full TLS (Thread Local Storage) support.☆95Oct 27, 2025Updated 5 months ago
- A cross-platform C++ framework for building Windows shellcode☆169Mar 4, 2026Updated last month
- Polaris: An LLVM-based obfuscator that protects software at various levels☆484Oct 4, 2025Updated 6 months ago
- Simple, fast and lightweight Header-Only C++ Assembler Library☆142Aug 13, 2025Updated 8 months ago
- Stack Spoofing with Synthetic frames based on the work of namazso, SilentMoonWalk, and VulcanRaven☆267Oct 16, 2024Updated last year
- Hooking Windows' exception dispatcher to protect process's PML4☆239Jan 24, 2025Updated last year
- PoC Implementation of a fully dynamic call stack spoofer☆943Jul 20, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A x86_64 software emulator☆160Aug 25, 2025Updated 7 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆301Jul 31, 2024Updated last year
- ☆392Jun 13, 2025Updated 10 months ago
- library for importing functions from dlls in a hidden, reverse engineer unfriendly way☆1,922Aug 3, 2023Updated 2 years ago
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆534Mar 24, 2026Updated 3 weeks ago
- Shellcode loader that executes embedded Lua from Rust.☆124Dec 16, 2024Updated last year
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆563Apr 8, 2025Updated last year
- Header-only C++ library for producing PE files.☆36Jun 17, 2023Updated 2 years ago
- Reverse engineering winapi function loadlibrary.☆240Apr 17, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆384Dec 13, 2024Updated last year
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆791Jan 26, 2026Updated 2 months ago
- Simple anti-instrumentation with EFLAGS.AC☆17Mar 31, 2025Updated last year
- LLVM based obfuscation engine☆115Mar 27, 2026Updated 2 weeks ago
- remote process injections using pool party techniques☆71Jun 29, 2025Updated 9 months ago
- Another LLVM-obfuscator based on LLVM-17. A fork of Arkari☆112Feb 18, 2024Updated 2 years ago
- All LLVM binaries scrambled with SigBreaker and used to test against llvm-lit☆27May 7, 2025Updated 11 months ago