airborne/reflective_loader/Cargo.toml
17ms 567e36a9f3 loader-level obfuscation during IAT patching
1.) shuffle Import Directory Table entries (image import descriptors)
2.) delay the relocation of each import a random duration
3.) conditional execution based on ordinal/name
4.) indirect function call via pointer
2024-02-12 20:10:20 +02:00

21 lines
383 B
TOML

[package]
name = "airborne-reflective_loader"
version = "0.1.0"
edition = "2021"
[lib]
crate-type = ["cdylib"]
[dependencies]
airborne-utils = { path = "../utils" }
[dependencies.windows-sys]
version = "0.52.0"
features = [
"Win32_Foundation",
"Win32_System_Kernel",
"Win32_System_Threading",
"Win32_System_WindowsProgramming",
"Win32_Security_Cryptography"
]