zompi2 / Variables-obfuscator
Simple memory obfuscator.
☆24Updated 2 years ago
Alternatives and similar repositories for Variables-obfuscator:
Users that are interested in Variables-obfuscator are comparing it to the libraries listed below
- ☆45Updated 2 years ago
- Helps to find patched modules☆27Updated 4 years ago
- ☆44Updated 4 years ago
- Mapping your code on a 0x1000 size page☆70Updated 2 years ago
- UM-KM Communication using registry callbacks☆39Updated 4 years ago
- mouseclassservicecallback detection via hook☆49Updated 2 years ago
- fecurity executor from factory☆33Updated 2 years ago
- ☆47Updated last year
- Stealing signatures from pe files☆16Updated 2 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆20Updated 3 years ago
- x64 manual mapper using inline syscalls☆7Updated 3 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆25Updated 3 years ago
- C/C++ example of InjectMouseInput function☆31Updated 3 years ago
- Discarded Section Manual Map☆67Updated 4 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆41Updated last year
- ☆15Updated 3 years ago
- ☆50Updated 2 years ago
- Only for Stress-Testing☆23Updated 2 years ago
- A simple MmCopyMemory hook.☆36Updated 2 years ago
- Detect removed thread from PspCidTable.☆70Updated 2 years ago
- ☆40Updated last year
- Old way for blocking NMI interrupts☆25Updated 2 years ago
- Hardware ID☆29Updated 2 years ago
- Hiding a system thread against conventional means of detection☆37Updated 4 years ago
- ☆78Updated 3 years ago
- ☆35Updated 4 years ago
- A simple present scene, kernel allocation injector.☆24Updated 2 years ago
- ☆40Updated 3 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago