Eronana / packer
A win32 exe packer
☆49Updated 5 years ago
Alternatives and similar repositories for packer:
Users that are interested in packer are comparing it to the libraries listed below
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 5 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆51Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆105Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆28Updated 5 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆40Updated 2 months ago
- A simple program to obfuscate code written in cpp.☆48Updated 11 months ago
- Convert PE files to a shellcode☆75Updated 4 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Compile-Time Calls Obfuscator for C++14+☆43Updated last year
- Detects virtual machines and malware analysis environments☆126Updated 2 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆46Updated 2 months ago
- Hide processes, files, services in Windows ring3☆24Updated 10 months ago
- Windows PE Signature Thief in C++☆49Updated 4 years ago
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆70Updated 3 years ago
- Windows API Call Obfuscation☆102Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆32Updated last year
- Hide function calls to prevent reverse-engineering☆69Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆179Updated last year
- Dumping processes using the power of kernel space !☆19Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- ☆65Updated 6 years ago
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 2 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆105Updated 2 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆60Updated 7 months ago
- Elevate a process to be a protected process☆149Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆137Updated 2 years ago