KSroido / upx-SM4View external linksLinks
基于upx的SM4加密壳
☆10May 12, 2023Updated 2 years ago
Alternatives and similar repositories for upx-SM4
Users that are interested in upx-SM4 are comparing it to the libraries listed below
Sorting:
- 简单的二进制加密壳☆12Aug 2, 2020Updated 5 years ago
- mozi僵尸网络的模仿实现 a simulating implementation of mozi botNet virus☆15Jul 31, 2022Updated 3 years ago
- PE文件解析和加壳工具☆18Feb 21, 2023Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Sep 30, 2021Updated 4 years ago
- This bot allows you to automate the download process from a page where links to download files are periodically added☆10Dec 16, 2019Updated 6 years ago
- 《计算机世界观》 助你塑造正确的计算机世界观☆39Jun 5, 2022Updated 3 years ago
- PE加壳程序☆79May 12, 2019Updated 6 years ago
- Simple x86 Trampoline Hook☆45Aug 3, 2022Updated 3 years ago
- Csharp 反射加载dll☆41Aug 8, 2021Updated 4 years ago
- https://typescripttolua.github.io/☆12Aug 25, 2025Updated 5 months ago
- 修改 pyTranscriber 得到 cli 版的 mypyTranscriber☆10Jun 9, 2021Updated 4 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- A Python simulation of the PURPLE cipher machine used by the Japanese Foreign Office for secure communications before and during World Wa…☆12Nov 7, 2025Updated 3 months ago
- 一个开源的压缩壳☆91Dec 31, 2018Updated 7 years ago
- A ready-made template for a project based on libpeconv.☆51Oct 31, 2025Updated 3 months ago
- ☆11Jun 1, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆10May 12, 2013Updated 12 years ago
- Quantum cracking encryption. Shor Algorithm.☆18Mar 14, 2025Updated 11 months ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- ☆11Jan 12, 2023Updated 3 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- A Machine Learning Based Web Application firewall☆10Nov 23, 2023Updated 2 years ago
- PDF reader extension for falkon☆10Sep 24, 2020Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- C# & Node.js Encrypt/Decrypt☆12Jul 13, 2018Updated 7 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- Port of kilo🏋️ text editor to Windows 🪟☆12Jun 26, 2022Updated 3 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- ☆10Feb 19, 2024Updated last year
- Proxy Implementation in Java☆10Feb 20, 2019Updated 6 years ago
- 乱七八糟的一些Tampermonkey脚本☆17Jul 18, 2025Updated 6 months ago
- A crypto-programming language including an IDE☆12Feb 12, 2025Updated last year
- 测试,示例☆11Jan 4, 2017Updated 9 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- 英雄联盟计算己方队友KDA(上等马下等马)☆12Apr 15, 2022Updated 3 years ago
- Implementation in pure Ruby for Microsoft RDP protocol☆10Sep 4, 2016Updated 9 years ago