Obfuscate
Guaranteed compile-time string literal obfuscation header-only library for C++14 (by adamyaxley)
inline_syscall
Inline syscalls made easy for windows on clang (by JustasMasiulis)
Obfuscate | inline_syscall | |
---|---|---|
1 | 1 | |
977 | 609 | |
- | - | |
4.9 | 1.8 | |
21 days ago | almost 2 years ago | |
C++ | C++ | |
The Unlicense | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Obfuscate
Posts with mentions or reviews of Obfuscate.
We have used some of these posts to build our list of alternatives
and similar projects.
-
How do I prevent abuse to my app?
if you hardcode the api key into your app, the apk can always get decompiled (apk -> dex -> dex2jar -> jar -> java decompiler). I personally hardcode sensitive api keys in C code, as #define constants. I use this class to obfiscate the C string constants. then I expose functions returning the api keys from C to java via JNI. I also use a mechanism to verify the apk signature, so that the C methods will only be called from the correct application (without this, others could take the .so library, include in their project, and just call the c functions from java / kotlin side, to get the api key). There was an article about this online, but i cannot find it right now.
inline_syscall
Posts with mentions or reviews of inline_syscall.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-03-16.
-
Can't do exploitation research on a novel unhooking approach without a database of the DLLs for every Windows version. Ideas?
https://github.com/JustasMasiulis/inline_syscall (AFAIK the only library that produces inline-able syscall stubs)
What are some alternatives?
When comparing Obfuscate and inline_syscall you can also consider the following projects:
llvm-string-obfuscator - LLVM String Obfuscator
SysWhispers2 - AV/EDR evasion via direct system calls.
span-lite - span lite - A C++20-like span for C++98, C++11 and later in a single-file header-only library
lazy_importer - library for importing functions from dlls in a hidden, reverse engineer unfriendly way
Black-Angel-Rootkit - Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.
ZwProcessHollowing - ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption
Corth - It's like Porth, but in C++. Yep, we're going full circle.
introvert