KooroshRZ / EvaderLinks
Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)
☆105Updated 5 years ago
Alternatives and similar repositories for Evader
Users that are interested in Evader are comparing it to the libraries listed below
Sorting:
- NINA: No Injection, No Allocation x64 Process Injection Technique☆226Updated 5 years ago
- A Simple AES Command Line Crypter☆37Updated 2 years ago
- A kernel rootkit with remote command and control interface for windows☆110Updated 7 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆73Updated 4 years ago
- An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.☆309Updated 6 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- Executes 64bit code from a 32bit process☆234Updated 8 years ago
- A more stealthy variant of "DLL hollowing"☆357Updated last year
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 3 months ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆64Updated 3 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆147Updated 2 years ago
- Process Hollowing for 32 bit and 64 bit☆79Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- A kernel-mode rootkit with remote control☆218Updated 4 years ago
- Research on Anti-malware and other related security solutions☆260Updated 5 years ago
- Various Process Injection Techniques☆156Updated 3 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Updated 5 years ago
- Windows System Programming Experiments☆221Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Easy XOR string encryption for NET based binaries☆139Updated last year
- A simple Windows kernel rootkit.☆92Updated 3 months ago
- https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/☆121Updated 5 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 2 months ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆182Updated 4 months ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- This is a simple example and explanation of obfuscating API resolution via hashing☆237Updated 5 years ago
- This is a RAT/Backdoor written in C++☆46Updated 4 years ago