EvilBytecode / PyDefenderLinks
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.
☆66Updated 4 months ago
Alternatives and similar repositories for PyDefender
Users that are interested in PyDefender are comparing it to the libraries listed below
Sorting:
- ☆27Updated 10 months ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆78Updated 6 months ago
- kernel-mode DLL Injector☆108Updated 4 months ago
- Decrypting yandex browser passwords☆24Updated 4 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆18Updated 4 months ago
- Reflective DLL Injection Made Bella☆234Updated 7 months ago
- ☆44Updated 11 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆110Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆114Updated 3 months ago
- Troll TaskManager, and play with it .☆25Updated 3 weeks ago
- Implementing the ghostly hollowing PE injection technique using tampered syscalls.☆169Updated 5 months ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆44Updated 11 months ago
- My POC implementation of HVNC (Hidden VNC / Hidden Desktop)☆26Updated 7 months ago
- The best powershell obfuscator ever made☆111Updated 3 weeks ago
- bootlicker: A terribly written but functioning UEFI shellcode bootkit patched into a firmware volume or boot device on the EFI partition☆33Updated 6 months ago
- Advanced dynamic malware analysis tool.☆84Updated last year
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆230Updated 9 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆50Updated 3 months ago
- reverse engineering random malwares☆25Updated 6 months ago
- ☆12Updated 10 months ago
- Retrieve the Chrome App Bound key using DLL injection — no administrator privileges required and no need to run from the chrome folder in…☆35Updated 4 months ago
- LKM rootkit for modern kernels, with DNS C2 and a simple web interface☆72Updated last month
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- A unique introduction to native runtime obfuscation.☆23Updated 5 months ago
- Measures average CPU cycles for the CPUID instruction to detect if the code is running in a VM by comparing against a threshold.☆21Updated 4 months ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆162Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆118Updated 4 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆19Updated 7 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆219Updated 2 years ago