PELock / Simple-Polymorphic-Engine-SPE32
Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used to demonstrate what polymorphic engines are.
☆137Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Simple-Polymorphic-Engine-SPE32
- Set of antianalysis techniques found in malware☆129Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆123Updated 2 years ago
- Advanced driver monitoring utility.☆201Updated 2 years ago
- A library to develop kernel level Windows payloads for post HVCI era☆366Updated 3 years ago
- Yet another windows internals repo☆205Updated 3 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆122Updated 2 years ago
- Some research on AltSystemCallHandlers functionality in Windows 10 20H1 18999☆206Updated 5 years ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆197Updated 3 years ago
- Anti-debugging techniques on a (bad looking) Win32 application.☆234Updated 8 months ago
- ☆103Updated 5 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆156Updated 4 months ago
- MalUnpack companion driver☆92Updated 5 months ago
- ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solution…☆196Updated 2 years ago
- Browse Page Tables on Windows (Page Table Viewer)☆184Updated 2 years ago
- Various Process Injection Techniques☆143Updated 2 years ago
- Abusing exceptions for code execution.☆107Updated last year
- MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features. M…☆219Updated 4 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆196Updated 4 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆115Updated last year
- The best theme for x64dbg!☆80Updated 2 years ago
- Simple windows API logger☆98Updated 5 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆103Updated 4 years ago
- Code Injection, Inject malicious payload via pagetables pml4.☆226Updated 3 years ago
- My reversing tools. Some custom, some not.☆194Updated 10 months ago
- My notes while studying Windows exploitation☆184Updated last year
- Analyze patches in a process☆246Updated 3 years ago
- HashDB API hash lookup plugin for IDA Pro☆296Updated last month
- Reverse engineered source code of the autochk rootkit☆197Updated 5 years ago
- x86 PE Mutator☆212Updated last year