PoC executable packer using resources
☆31Sep 29, 2016Updated 9 years ago
Alternatives and similar repositories for Packer
Users that are interested in Packer are comparing it to the libraries listed below
Sorting:
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Feb 22, 2019Updated 7 years ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- PInvoke at runtime for .NET☆17Sep 13, 2018Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- ☆15Feb 21, 2014Updated 12 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Kindly Win x86/x64 DLL Injector☆15Aug 17, 2019Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆50May 28, 2017Updated 8 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- simple PE packer written in C++☆56Feb 23, 2018Updated 8 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Dynamic COFF object loader☆23Jun 29, 2018Updated 7 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- ☆42Aug 10, 2019Updated 6 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- DLL Injection commandline utility☆26Mar 14, 2013Updated 12 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- Remote Process Control Library☆26Dec 12, 2022Updated 3 years ago
- Disabling Windows Defender & downloading payload☆21Jul 28, 2020Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Loading a native DLL in the memory.☆70Mar 15, 2018Updated 7 years ago
- 新的注入方式☆11Sep 30, 2018Updated 7 years ago