Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.
☆16Jul 29, 2016Updated 9 years ago
Alternatives and similar repositories for File-Binder
Users that are interested in File-Binder are comparing it to the libraries listed below
Sorting:
- Blocker Hacks☆15Apr 8, 2022Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- ☆13Apr 1, 2017Updated 8 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 5 months ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago
- An open-source, centralized HTTPS botnet☆79Apr 11, 2023Updated 2 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆71Oct 10, 2016Updated 9 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- ☆42Mar 7, 2017Updated 8 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Bind 2 exe's and have them run at the same time.☆48Nov 24, 2014Updated 11 years ago
- An open-source, centralized HTTPS botnet☆46Apr 14, 2020Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Simple runtime crypter in C++.☆43Dec 8, 2014Updated 11 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Jun 17, 2020Updated 5 years ago
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- Fetches YouTube Premium codes from Discord Inventory using tokens (supports bulk)☆11Jun 22, 2022Updated 3 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- A faster base 64 encoder for .net / c# when using other kind charactersets or you don't use padding.☆44Feb 15, 2026Updated 2 weeks ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago