C5Hackr / Segment-Encryption
☆23Updated 5 months ago
Alternatives and similar repositories for Segment-Encryption:
Users that are interested in Segment-Encryption are comparing it to the libraries listed below
- It was a great run, but everything must come to an end. Please don’t contact me. Before I go, here’s a final gift :)☆21Updated 3 weeks ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆30Updated 6 months ago
- shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually fro…☆9Updated 7 months ago
- ☆31Updated 6 months ago
- ☆44Updated 2 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆39Updated 6 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated 2 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆44Updated last year
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆11Updated 4 months ago
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆25Updated 10 months ago
- Ransomware written in go, encrypt - decrypt.☆20Updated 9 months ago
- https://github.com/janoglezcampos/c_syscalls with the ASM rewritten by myself for Visual Studio's Compiler.☆30Updated 9 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆50Updated 3 weeks ago
- Near compile-time string obfuscation for Golang☆13Updated last year
- C/C++ antidebugging library for Windows☆18Updated 3 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆21Updated 3 months ago
- A very weird RAT☆19Updated 2 years ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆19Updated 8 months ago
- simple user-mode Rootkit☆103Updated 2 years ago
- ☆38Updated 2 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆38Updated 7 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆11Updated 9 months ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆27Updated 8 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆33Updated 5 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆11Updated 8 months ago
- A C/C++ framework designed to simplify shellcode creation on any compilers and platforms using C. Supports Windows & Linux, and practical…☆14Updated 7 months ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆17Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago