KingKDot / ExorcismLinks
The first open source runtime windows batch and command line deobfuscator
☆38Updated last month
Alternatives and similar repositories for Exorcism
Users that are interested in Exorcism are comparing it to the libraries listed below
Sorting:
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- ☆48Updated last year
- Advanced dynamic malware analysis tool.☆82Updated last year
- Troll TaskManager, and play with it .☆27Updated 2 months ago
- ☆11Updated 11 months ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 5 months ago
- ☆37Updated last year
- Ransomware written in go, encrypt - decrypt.☆30Updated 5 months ago
- kernel-mode DLL Injector☆110Updated 5 months ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆49Updated last week
- The best powershell obfuscator ever made☆112Updated 2 months ago
- simple user-mode Rootkit☆106Updated 2 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Unhook Ntdll.dll, Go & C++.☆29Updated 5 months ago
- Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.☆66Updated 5 months ago
- Nim process hollowing loader☆60Updated 2 months ago
- using the gpu to hide your payload☆62Updated 3 years ago
- A 64 bit executable junk code engine for polymorphic malware.☆70Updated 3 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆79Updated 3 months ago
- ☆20Updated 7 months ago
- ☆26Updated 11 months ago
- "Service-less" driver loading☆161Updated 10 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Windows 10 DLL Injector via Driver utilizing VAD and hiding the loaded driver☆50Updated last year
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆55Updated last month
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Bypasses AMSI protection through remote memory patching and parsing technique.☆50Updated 5 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- ☆20Updated 5 months ago
- a stage1 DLL loader with sleep obfuscation☆37Updated 2 years ago