MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by Merccy
-
Updated
Aug 29, 2016 - C++
MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by Merccy
Using GNU lightning to generate xor deobfuscation at runtime
Obfuscates all RTTI (Run-time type information) inside a binary
based on llvm 5.0.1 release with ollvm
一款iOS代码混淆工具(A code obfuscation tool for iOS.)
Windows Reverse engineering challenge implementing several obfuscation and anti-debugging techniques
convert c/c++ code into well-formed ascii art
A community maintained fork of the PZDC blockchain
An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Obfuscate shared objects by hashing symbol names
Folm
The tool for mixing source code branches in case it gets investigated
Polymorphic VM and PoliCTF '17 reversing challenge.
A platform independent C++ code obfuscator.
C++11/14 obfuscation techniques.
C++ Compile time NAND/NOR obfuscation
Tutorial on how to write the dumbest obfuscator I could think of.
Add a description, image, and links to the obfuscation topic page so that developers can more easily learn about it.
To associate your repository with the obfuscation topic, visit your repo's landing page and select "manage topics."