NUL0x4C / AtomPePacker
A Highly capable Pe Packer
☆698Updated 2 years ago
Alternatives and similar repositories for AtomPePacker:
Users that are interested in AtomPePacker are comparing it to the libraries listed below
- Cobalt Strike UDRL for memory scanner evasion.☆921Updated 10 months ago
- A POC for the new injection technique, abusing windows fork API to evade EDRs. https://www.blackhat.com/eu-22/briefings/schedule/index.ht…☆633Updated 2 years ago
- Sleep Obfuscation☆742Updated last year
- HWSyscalls is a new method to execute indirect syscalls using HWBP, HalosGate and a synthetic trampoline on kernel32 with HWBP.☆664Updated last year
- TartarusGate, Bypassing EDRs☆579Updated 3 years ago
- Performing Indirect Clean Syscalls☆535Updated 2 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆491Updated 2 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆532Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆469Updated 2 years ago
- Automated DLL Sideloading Tool With EDR Evasion Capabilities☆469Updated last year
- PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.☆580Updated last year
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆756Updated 3 years ago
- ☆477Updated 2 years ago
- Lifetime AMSI bypass☆624Updated last year
- Shoggoth: Asmjit Based Polymorphic Encryptor☆721Updated last year
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆1,309Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,414Updated 8 months ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆671Updated last month
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆964Updated last year
- ☆525Updated last year
- Experimental Windows x64 Kernel Rootkit with anti-rootkit evasion features.☆531Updated last month
- Various ways to execute shellcode☆487Updated last year
- A Payload Loader Designed With Advanced Evasion Features☆511Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆488Updated last year
- Reduce Entropy And Obfuscate Youre Payload With Serialized Linked Lists☆432Updated last year
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆653Updated last year
- A DLL loader with advanced evasive features☆711Updated 2 years ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆933Updated last year
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆415Updated last year
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆509Updated 2 years ago