Eronana / packerLinks
A win32 exe packer
☆48Updated 5 years ago
Alternatives and similar repositories for packer
Users that are interested in packer are comparing it to the libraries listed below
Sorting:
- sc4cpp is a shellcode framework based on C++☆95Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 7 months ago
- Convert PE files to a shellcode☆80Updated 5 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆142Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆167Updated 4 years ago
- Windows PE Signature Thief in C++☆51Updated 5 years ago
- Windows API Call Obfuscation☆112Updated 3 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆55Updated 2 years ago
- C++ implementation of compile time obfuscator☆166Updated 6 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆30Updated 5 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Updated 8 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- Header only library for obfuscation import winapi functions.☆43Updated 11 months ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆127Updated 3 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆40Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Updated 4 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- Hide DLL / Hide Module / Hide Dynamic Link Library☆108Updated 6 years ago
- Compile-Time Calls Obfuscator for C++14+☆50Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 3 years ago
- Authenticode Hash Calculator for PE32/PE32+ files☆120Updated 6 months ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆193Updated 2 years ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Call NtCreateUserProcess directly as normal.☆76Updated 3 years ago
- x86-x64 Packer with Portable Executable compatibility.☆98Updated last month
- Kill Protected Process Light Process (include av)☆58Updated 2 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆86Updated 6 years ago
- Dumping processes using the power of kernel space !☆19Updated 5 years ago
- Server/Client SOCKS5 (RFC 1928) in Reverse mode on Windows☆37Updated 6 years ago