Infects PE files with a shellcode
☆22Oct 20, 2018Updated 7 years ago
Alternatives and similar repositories for PE-File-Infection
Users that are interested in PE-File-Infection are comparing it to the libraries listed below
Sorting:
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Suspend and resume processes by using functions in ntdll.dll.☆15Feb 23, 2014Updated 12 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- [ICSE'24] An Empirical Study of Data Disruption by Ransomware Attacks☆13Mar 1, 2024Updated 2 years ago
- 对debughelp的二次开发☆11Feb 20, 2023Updated 3 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- File system minifilter driver for Windows to block symbolic link attacks.☆51Dec 16, 2020Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Jun 30, 2013Updated 12 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- Rerousces related to time-travel debugging (TTD)☆33Jan 6, 2026Updated 2 months ago
- Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215☆17Nov 17, 2022Updated 3 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- windows kernel pagehook☆42Oct 30, 2022Updated 3 years ago
- 热门网络游戏辅助开发教程☆15Jan 7, 2021Updated 5 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- ☆29Aug 24, 2025Updated 6 months ago
- Windows Minifilter driver that redirects any I/O Request of mp3 files to a target file☆18Jul 7, 2015Updated 10 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year