0xyg3n / mem64View external linksLinks
Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.
☆28May 22, 2017Updated 8 years ago
Alternatives and similar repositories for mem64
Users that are interested in mem64 are comparing it to the libraries listed below
Sorting:
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Red Team C2 and Post Exploitation code☆34Jul 8, 2025Updated 7 months ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- Use TpAllocWork, TpPostWork and TpReleaseWork to execute machine code☆24Mar 13, 2023Updated 2 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- Suite of Shellcode Running Utilities☆114Jan 30, 2020Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Jun 4, 2019Updated 6 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Apr 15, 2016Updated 9 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Aug 6, 2018Updated 7 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- A cross-platform remote administration tool written in Java☆20Aug 26, 2020Updated 5 years ago
- File and executable crypter with comprehensible GUI and built-in anti-malicious use☆21Sep 3, 2020Updated 5 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago
- JS Jscript - download file from url then run it☆60Mar 11, 2020Updated 5 years ago
- Add export function and convert exe to dll☆26Sep 20, 2020Updated 5 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Mar 8, 2023Updated 2 years ago