KingKDot / ExorcismLinks
The first open source runtime windows batch and command line deobfuscator
☆39Updated 3 months ago
Alternatives and similar repositories for Exorcism
Users that are interested in Exorcism are comparing it to the libraries listed below
Sorting:
- Advanced dynamic malware analysis tool.☆82Updated last year
- PoC for popping a system shell against the LnvMSRIO.sys driver☆115Updated 2 months ago
- Troll TaskManager, and play with it .☆28Updated 4 months ago
- ☆49Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 7 months ago
- Ransomware written in go, encrypt - decrypt.☆30Updated 7 months ago
- Nim process hollowing loader☆60Updated 4 months ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆50Updated 3 weeks ago
- A Bumblebee-inspired Crypter☆78Updated 3 years ago
- ☆12Updated last year
- simple user-mode Rootkit☆107Updated 3 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54Updated 7 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆104Updated last month
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆58Updated 2 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆41Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆28Updated last year
- using the gpu to hide your payload☆63Updated 3 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆23Updated last year
- kernel-mode DLL Injector☆119Updated 7 months ago
- A 64 bit executable junk code engine for polymorphic malware.☆73Updated 5 months ago
- Unhook Ntdll.dll, Go & C++.☆32Updated 7 months ago
- Fork of Get-InjectedThread - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2☆46Updated 2 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Technique☆13Updated last year
- "Service-less" driver loading☆165Updated last year
- ☆39Updated last year
- ☆26Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆91Updated 5 months ago