C5Hackr / EclipseLinks
A unique introduction to native runtime obfuscation.
☆19Updated 3 months ago
Alternatives and similar repositories for Eclipse
Users that are interested in Eclipse are comparing it to the libraries listed below
Sorting:
- ☆25Updated 8 months ago
- Stealer in c++.☆42Updated last month
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆32Updated 8 months ago
- Ransomware written in go, encrypt - decrypt.☆25Updated last month
- Kill malawarebytes process. Can be ported to any programming language.☆10Updated 2 months ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆18Updated last month
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated 9 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆15Updated last month
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 9 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆43Updated last week
- ☆22Updated 7 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- kASLR bypass technique on Intel CPUs.☆14Updated last month
- kernel-mode DLL Injector☆85Updated 2 months ago
- Decrypting yandex browser passwords☆21Updated 2 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Updated 2 months ago
- Exploit for eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆39Updated last week
- Spoof the return address of any function call.☆11Updated 11 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆15Updated 2 months ago
- ☆12Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 6 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 2 months ago
- ☆45Updated 4 months ago
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆10Updated 2 months ago
- An improved version of Patch Guard that I implemented, that includes integrity checks and other protection mechanisms I added.☆70Updated 2 months ago
- ☆35Updated 9 months ago
- Callstack spoofing using a VEH because VEH all the things.☆21Updated 3 months ago