vxCrypt0r / Voidmaw

A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders implemented by C2 beacons) or other problematic executables that will be flagged by the antimalware programs(such as mimikatz).

Date Created 2024-10-07 (about a month ago)
Commits 9 (last one about a month ago)
Stargazers 230 (124 this week)
Watchers 3 (1 this week)
Forks 40
License bsd-3-clause
Ranking

RepositoryStats indexes 584,777 repositories, of these vxCrypt0r/Voidmaw is ranked #161,794 (72nd percentile) for total stargazers, and #422,609 for total watchers. Github reports the primary language for this repository as C++, for repositories using this language it is ranked #9,117/31,292.

Other Information

Homepage URL: https://x.com/vxCrypt0r

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

9 commits on the default branch (master) since jan '22

Yearly Commits

Commits to the default branch (master) per year

Issue History

Languages

The primary language is C++ but there's also others...

updated: 2024-11-21 @ 12:47pm, id: 868829594 / R_kgDOM8lJmg