PELock / StringEncrypt-Python
StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-called polymorphic code) each time in the selected programming language.
☆20Updated last year
Related projects ⓘ
Alternatives and complementary repositories for StringEncrypt-Python
- Decompiled NotPetya File Encryptor Code☆12Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆15Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Ransomware Using CryptoAPI☆13Updated 6 years ago
- ☆23Updated 9 months ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- ☆18Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 6 months ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- C# DLL Injector written as simple as possible☆13Updated 3 years ago
- Simple class to search and upload files☆26Updated 5 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Updated 7 years ago
- A Portable Executable (PE) Format poster in A1 59,4 x 84,1 cm format, including almost all of the structures from PE/PE32+ format (with c…☆19Updated last year
- ClipBanker Spy Trojan☆10Updated 2 months ago