KooroshRZ / Evader
Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
☆102Updated 4 years ago
Alternatives and similar repositories for Evader:
Users that are interested in Evader are comparing it to the libraries listed below
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- A PoC designed to bypass all usermode hooks in a WoW64 environment.☆149Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆341Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 7 years ago
- A Simple AES Command Line Crypter☆35Updated 2 years ago
- Various Process Injection Techniques☆148Updated 2 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆170Updated 3 months ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆303Updated 6 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- Files for the packer tutorial☆72Updated 4 years ago
- Asynchronous Procedure Calls☆219Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago
- A kernel-mode rootkit with remote control☆210Updated 4 years ago
- Yet another variant of Process Hollowing☆383Updated last month
- FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++17!☆322Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆106Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- Manual DLL Injector using Thread Hijacking.☆234Updated 7 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆202Updated 3 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆190Updated 8 years ago
- Inject code into a legitimate process☆143Updated 10 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆193Updated 5 years ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆118Updated 5 years ago
- A simple Windows kernel rootkit.☆90Updated last year
- A quick-and-dirty anti-hook library proof of concept.☆103Updated 6 years ago
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆200Updated 4 months ago
- PoC designed to evade userland-hooking anti-virus.☆88Updated 5 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆231Updated 3 years ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆57Updated 3 years ago
- Executes 64bit code from a 32bit process☆230Updated 7 years ago