Eronana / packer
A win32 exe packer
☆48Updated 5 years ago
Alternatives and similar repositories for packer:
Users that are interested in packer are comparing it to the libraries listed below
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆51Updated last year
- Add an empty section to a PE file☆53Updated 7 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 5 years ago
- A simple program to obfuscate code written in cpp.☆48Updated 10 months ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆264Updated 2 years ago
- Convert PE files to a shellcode☆74Updated 4 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- Record & prevent file deletion in kernel mode☆42Updated 4 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- From 32-bit process to 64-bit process☆70Updated 3 years ago
- ☆41Updated this week
- Collection of DLL function export forwards for DLL export function proxying☆95Updated last year
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆27Updated 4 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated last year
- Windows API Call Obfuscation☆99Updated 2 years ago
- Detects virtual machines and malware analysis environments☆120Updated 2 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- Compile-Time Calls Obfuscator for C++14+☆42Updated last year
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆45Updated last month
- CVE-2022-3699 with arbitrary kernel code execution capability☆69Updated 2 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆178Updated last year
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆110Updated 2 years ago
- x64 Windows kernel code execution via user-mode, arbitrary syscall, vulnerable IOCTLs demonstration☆307Updated 2 years ago
- C++ implementation of compile time obfuscator☆142Updated 5 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆56Updated last year
- Custom LoadLibrary / GetProcAddress (x86 / x64) - Load DLL and retrieve functions manually☆87Updated last year
- Hook all callbacks which are registered with LdrRegisterDllNotification☆85Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆32Updated last year
- 研究和移除各种内核回调,在anti anti cheat的路上越走越远☆173Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago