Obfuscate
inline_syscall
Obfuscate | inline_syscall | |
---|---|---|
1 | 1 | |
1,108 | 687 | |
1.0% | 1.3% | |
4.9 | 3.4 | |
7 months ago | 8 months ago | |
C++ | C++ | |
The Unlicense | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Obfuscate
-
How do I prevent abuse to my app?
if you hardcode the api key into your app, the apk can always get decompiled (apk -> dex -> dex2jar -> jar -> java decompiler). I personally hardcode sensitive api keys in C code, as #define constants. I use this class to obfiscate the C string constants. then I expose functions returning the api keys from C to java via JNI. I also use a mechanism to verify the apk signature, so that the C methods will only be called from the correct application (without this, others could take the .so library, include in their project, and just call the c functions from java / kotlin side, to get the api key). There was an article about this online, but i cannot find it right now.
inline_syscall
-
Can't do exploitation research on a novel unhooking approach without a database of the DLLs for every Windows version. Ideas?
https://github.com/JustasMasiulis/inline_syscall (AFAIK the only library that produces inline-able syscall stubs)
What are some alternatives?
span-lite - span lite - A C++20-like span for C++98, C++11 and later in a single-file header-only library
lazy_importer - library for importing functions from dlls in a hidden, reverse engineer unfriendly way
llvm-string-obfuscator - LLVM String Obfuscator
Corth - It's like Porth, but in C++. Yep, we're going full circle.
filesystem - An implementation of C++17 std::filesystem for C++11 /C++14/C++17/C++20 on Windows, macOS, Linux and FreeBSD.
ZwProcessHollowing - ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption
kfr - Fast, modern C++ DSP framework, FFT, Sample Rate Conversion, FIR/IIR/Biquad Filters (SSE, AVX, AVX-512, ARM NEON)
SysWhispers2 - AV/EDR evasion via direct system calls.
doctest - The fastest feature-rich C++11/14/17/20/23 single-header testing framework
Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
introvert
HellHall - Performing Indirect Clean Syscalls