Infects PE files with a shellcode
☆22Oct 20, 2018Updated 7 years ago
Alternatives and similar repositories for PE-File-Infection
Users that are interested in PE-File-Infection are comparing it to the libraries listed below
Sorting:
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Sep 7, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Aug 29, 2016Updated 9 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Disassembler Library for x86 and x86-64☆15Apr 7, 2020Updated 5 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Sep 19, 2018Updated 7 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- 动手打造一个 Windows 下的 C 语言调试器☆19Mar 26, 2017Updated 8 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- A collection of code examples e.g. a buffer overflow + exploit, crypter, shellcodes and more.☆16Apr 5, 2024Updated last year
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- Hot reload DLL on windows☆11Oct 7, 2018Updated 7 years ago
- Rerousces related to time-travel debugging (TTD)☆31Jan 6, 2026Updated last month
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Jun 30, 2013Updated 12 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 6 years ago
- 对debughelp的二次开发☆11Feb 20, 2023Updated 3 years ago
- Change the entry point of Windows PE file and inject a dynamic library, in order to crack software of fix games.☆10Jun 11, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- ☆30Aug 24, 2025Updated 6 months ago