PELock / Simple-Polymorphic-Engine-SPE32
Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
☆137Updated last year
Alternatives and similar repositories for Simple-Polymorphic-Engine-SPE32:
Users that are interested in Simple-Polymorphic-Engine-SPE32 are comparing it to the libraries listed below
- Set of antianalysis techniques found in malware☆129Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆133Updated 2 years ago
- Yet another windows internals repo☆205Updated 3 years ago
- Advanced driver monitoring utility.☆202Updated 2 years ago
- Various Process Injection Techniques☆145Updated 2 years ago
- A more stealthy variant of "DLL hollowing"☆339Updated 10 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆195Updated 4 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆116Updated last year
- Code Injection, Inject malicious payload via pagetables pml4.☆230Updated 3 years ago
- Inject code into a legitimate process☆143Updated 10 years ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆198Updated 2 years ago
- APC Internals Research Code☆161Updated 4 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆243Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆206Updated 5 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- Kernel Security driver used to block past, current and future process injection techniques on Windows Operating System.☆149Updated 2 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆201Updated 3 years ago
- Analyze patches in a process☆248Updated 3 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆160Updated last month
- x86 PE Mutator☆212Updated 2 years ago
- A quick-and-dirty anti-hook library proof of concept.☆102Updated 6 years ago
- Abusing exceptions for code execution.☆108Updated 2 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆194Updated 2 years ago
- My notes while studying Windows exploitation☆185Updated last year
- Anti-debugging techniques on a (bad looking) Win32 application.☆235Updated 10 months ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆83Updated 2 years ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆134Updated last year
- Simple windows API logger☆98Updated 5 years ago
- MalUnpack companion driver☆93Updated 7 months ago