Eronana / packer
A win32 exe packer
☆47Updated 5 years ago
Alternatives and similar repositories for packer:
Users that are interested in packer are comparing it to the libraries listed below
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆51Updated last year
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 5 years ago
- Compile-Time Calls Obfuscator for C++14+☆38Updated last year
- Add an empty section to a PE file☆52Updated 7 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆68Updated 2 years ago
- Convert PE files to a shellcode☆74Updated 4 years ago
- A simple program to obfuscate code written in cpp.☆48Updated 9 months ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- Collection of DLL function export forwards for DLL export function proxying☆93Updated last year
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆104Updated 2 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆135Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- ☆66Updated 6 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆107Updated 2 years ago
- Kernel shellcode injector☆143Updated 3 years ago
- Windows API Call Obfuscation☆99Updated 2 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆81Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated 2 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆160Updated 3 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆55Updated last year
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆27Updated 4 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆44Updated last week
- Inject the whole exe into another process☆44Updated 6 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆34Updated 6 years ago
- Reverse Socks5 proxy for windows☆13Updated 2 years ago
- Hide processes, files, services in Windows ring3☆23Updated 8 months ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆31Updated last year
- Shellcode to load an appended Dll☆88Updated 4 years ago