17ms
567e36a9f3
loader-level obfuscation during IAT patching
...
1.) shuffle Import Directory Table entries (image import descriptors)
2.) delay the relocation of each import a random duration
3.) conditional execution based on ordinal/name
4.) indirect function call via pointer
2024-02-12 20:10:20 +02:00
17ms
08a32b0816
tested builds w/o loader-level obfuscation
2024-02-11 22:52:08 +02:00
17ms
196b93c9bb
replaced ref with pass-by-ref
2024-01-08 22:18:02 +02:00
17ms
ef9b173c6e
proper linting & google formatting
2024-01-06 13:53:18 +02:00
17ms
3824443f0e
update build to match dir structure
2024-01-05 21:48:20 +02:00
17ms
ee6da55d83
randomized XOR & organized common headers
2024-01-05 21:02:01 +02:00
17ms
471271128f
separate shared modules
2024-01-05 18:32:18 +02:00
17ms
ee520720e4
include missing header
2024-01-04 20:14:09 +02:00
17ms
74d933b8a2
build size optimizations, streamlining
2024-01-04 20:00:24 +02:00
17ms
e60e521653
obfuscate loader IAT patching with conditional sleeps
2024-01-03 17:25:17 +02:00
17ms
a46216abfc
c++ conversion & updated build config
2024-01-02 23:06:07 +02:00
17ms
ccf0d4d183
fixed casting & naming compilation errors
2023-12-30 23:22:09 +02:00