0x9090 / RunPE
RunPE Code Injection
☆18Updated 4 years ago
Alternatives and similar repositories for RunPE:
Users that are interested in RunPE are comparing it to the libraries listed below
- ☆13Updated 8 years ago
- Shortcut Downloader☆11Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆92Updated 3 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Various Crypter Project☆51Updated 11 years ago
- Simple runtime crypter in C++.☆44Updated 10 years ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- Power Loader botnet☆39Updated 10 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- medium-rare☆28Updated 5 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆26Updated 9 years ago
- A C++ POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread. Credit to @spotheplanet for his notes…☆43Updated 4 years ago
- ☆45Updated 6 years ago
- Windows Antivirus Evasion and Memory Injection☆13Updated 3 years ago
- Proxy system calls over an RPC channel☆98Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- PoC for Bypassing UM Hooks By Bruteforcing Intel Syscalls☆38Updated 9 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆53Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- Dodgy reflective DLL injector PoC for 32-bit Windows☆16Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 7 months ago
- ☆43Updated 7 years ago
- a program to detect reflective dll injection on a live machine☆74Updated 9 years ago
- The exploit for Panda AV LPE☆37Updated 5 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 11 years ago