Eronana / packerLinks
A win32 exe packer
☆48Updated 5 years ago
Alternatives and similar repositories for packer
Users that are interested in packer are comparing it to the libraries listed below
Sorting:
- Convert PE files to a shellcode☆79Updated 5 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆142Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 7 months ago
- sc4cpp is a shellcode framework based on C++☆90Updated 4 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆54Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆112Updated 3 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆28Updated 3 years ago
- C++ implementation of compile time obfuscator☆160Updated 6 years ago
- Windows PE Signature Thief in C++☆50Updated 5 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 3 months ago
- Collection of DLL function export forwards for DLL export function proxying☆105Updated last month
- Windows API Call Obfuscation☆109Updated 2 years ago
- A tool designed to increase privacy on Windows and counter malware using various techniques.☆12Updated 5 months ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- Add an empty section to a PE file☆53Updated 8 years ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆154Updated 3 years ago
- DSE bypass using a leaked cert and adjusting the current clock.☆152Updated 3 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆31Updated 5 years ago
- Authenticode Hash Calculator for PE32/PE32+ files☆114Updated 2 months ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆67Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆186Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆36Updated 2 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆274Updated 2 years ago
- ☆68Updated 6 years ago
- A modern C++20 header-only library for advanced direct system call invocation.☆140Updated 2 weeks ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆166Updated 4 years ago
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- Call NtCreateUserProcess directly as normal.☆74Updated 3 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- 利用物理内存映射,实现虚拟内存的伪隐 藏☆84Updated 3 years ago