Eronana / packerLinks
A win32 exe packer
☆48Updated 5 years ago
Alternatives and similar repositories for packer
Users that are interested in packer are comparing it to the libraries listed below
Sorting:
- It's a kernel-based keylogger for Windows x86/x64.☆142Updated 3 years ago
- A simple program to obfuscate code written in cpp.☆51Updated last year
- Using NtCreateFile and NtDeviceIoControlFile to realize the function of winsock(利用NtCreateFile和NtDeviceIoControlFile 实现winsock的功能)☆112Updated 3 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆54Updated 2 years ago
- Windows API Call Obfuscation☆108Updated 2 years ago
- Convert PE files to a shellcode☆80Updated 5 years ago
- sc4cpp is a shellcode framework based on C++☆93Updated 4 years ago
- Collection of DLL function export forwards for DLL export function proxying☆105Updated 2 months ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Windows PE Signature Thief in C++☆51Updated 5 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 8 months ago
- HTTPS GET RAT and Memory Loader☆25Updated 4 months ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- Call NtCreateUserProcess directly as normal.☆75Updated 3 years ago
- Authenticode Hash Calculator for PE32/PE32+ files☆116Updated 4 months ago
- CVE-2022-3699 with arbitrary kernel code execution capability☆70Updated 2 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆92Updated 8 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- ☆69Updated 7 years ago
- Shellcode to load an appended Dll☆91Updated 5 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆43Updated 4 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 6 years ago
- Compile-Time Calls Obfuscator for C++14+☆48Updated last year
- 利用物理内存映射,实现虚拟内存的伪隐藏☆83Updated 3 years ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆154Updated 3 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆30Updated 5 years ago
- Inline syscalls made for MSVC supporting x64 and WOW64☆187Updated 2 years ago
- Inject unsigned DLL into Protected Process Light (PPL)☆28Updated 6 months ago
- Inject a Dll from memory☆45Updated 6 years ago
- PoC capable of detecting manual syscalls from usermode.☆202Updated 11 months ago