Eronana / packerLinks
A win32 exe packer
☆49Updated 5 years ago
Alternatives and similar repositories for packer
Users that are interested in packer are comparing it to the libraries listed below
Sorting:
- Collection of DLL function export forwards for DLL export function proxying☆98Updated last year
- sc4cpp is a shellcode framework based on C++☆90Updated 3 years ago
- It's a kernel-based keylogger for Windows x86/x64.☆141Updated 2 years ago
- Add an empty section to a PE file☆52Updated 7 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- Convert PE files to a shellcode☆78Updated 5 years ago
- Windows API Call Obfuscation☆106Updated 2 years ago
- HTTPS GET RAT and Memory Loader☆25Updated last month
- Windows PE Signature Thief in C++☆50Updated 4 years ago
- Authenticode Hash Calculator for PE32/PE32+ files☆112Updated 2 weeks ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆30Updated 5 years ago
- A simple program to obfuscate code written in cpp.☆50Updated last year
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆153Updated 2 years ago
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆111Updated 2 years ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆71Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆26Updated 3 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 6 years ago
- ☆65Updated 6 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆82Updated 6 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆182Updated 2 years ago
- Record & prevent file deletion in kernel mode☆44Updated 4 years ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- Hook NtDeviceIoControlFile with PatchGuard☆108Updated 3 years ago
- PoC: Exploit 32-bit Thread Snapshot of WOW64 to Take Over $RIP & Inject & Bypass Antivirus HIPS (HITB 2021)☆162Updated 4 years ago
- Kill Protected Process Light Process (include av)☆58Updated last year
- Shellcode to load an appended Dll☆90Updated 4 years ago
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- Hide function calls to prevent reverse-engineering☆71Updated 4 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆64Updated 10 months ago