Eronana / packer
A win32 exe packer
☆46Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for packer
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 5 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆50Updated last year
- sc4cpp is a shellcode framework based on C++☆87Updated 3 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆253Updated 2 years ago
- Add an empty section to a PE file☆50Updated 7 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆99Updated 2 years ago
- Windows API Call Obfuscation☆94Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆101Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆33Updated last year
- Convert PE files to a shellcode☆73Updated 4 years ago
- Collection of DLL function export forwards for DLL export function proxying☆91Updated last year
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated last year
- Header only library for obfuscation import winapi functions.☆32Updated 3 years ago
- Kernel shellcode injector☆144Updated 3 years ago
- Elevate a process to be a protected process☆143Updated 5 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆30Updated last year
- Dumping processes using the power of kernel space !☆19Updated 4 years ago
- ☆28Updated this week
- Reverse engineering winapi function loadlibrary.☆70Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆175Updated last year
- Record & prevent file deletion in kernel mode☆40Updated 4 years ago
- Detects virtual machines and malware analysis environments☆115Updated 2 years ago
- Windows PE Signature Thief in C++☆50Updated 4 years ago
- Shellcode to load an appended Dll☆89Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆102Updated 3 years ago
- PoC capable of detecting manual syscalls from usermode.☆183Updated this week
- Hook all callbacks which are registered with LdrRegisterDllNotification☆83Updated last year
- Heaven's Gate implementation in C for constructing x64 Win32 API call in x86 WoW64 processes.☆67Updated 3 years ago
- Samples from my book Windows Native API programming☆57Updated 4 months ago