Eronana / packerLinks
A win32 exe packer
☆49Updated 5 years ago
Alternatives and similar repositories for packer
Users that are interested in packer are comparing it to the libraries listed below
Sorting:
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- A simple program to obfuscate code written in cpp.☆49Updated last year
- Hide function calls to prevent reverse-engineering☆69Updated 4 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆50Updated 3 months ago
- Compile-Time Calls Obfuscator for C++14+☆43Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- Convert PE files to a shellcode☆76Updated 5 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆181Updated last year
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 5 years ago
- Header only library for obfuscation import winapi functions.☆40Updated 3 months ago
- Collection of DLL function export forwards for DLL export function proxying☆98Updated last year
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆63Updated 9 months ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- All Nt Syscall and W32k Syscall in one asm, include, and call it!☆58Updated 3 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆106Updated 3 years ago
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆87Updated 2 months ago
- Add an empty section to a PE file☆51Updated 7 years ago
- Inject the whole exe into another process☆44Updated 6 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- Windows API Call Obfuscation☆104Updated 2 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- Obfuscate calls to imports by patching in stubs☆68Updated 3 years ago
- Custom LoadLibrary / GetProcAddress (x86 / x64) - Load DLL and retrieve functions manually☆92Updated last year
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- LSASS INJECTOR☆35Updated 6 years ago
- Record & prevent file deletion in kernel mode☆43Updated 4 years ago