PELock / StringEncrypt-Python
StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-called polymorphic code) each time in the selected programming language.
☆20Updated last year
Alternatives and similar repositories for StringEncrypt-Python:
Users that are interested in StringEncrypt-Python are comparing it to the libraries listed below
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- AutoIt Obfuscator lets you protect AutoIt script source code against analysis, reverse engineering & decompilation using advanced obfusca…☆45Updated 11 months ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 2 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆16Updated 3 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- ☆18Updated 4 years ago
- TaskMgr Volatile Environment LPE☆12Updated last month
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- This script make any windows compatible with RDP connection☆18Updated 5 years ago
- A very weird RAT☆20Updated 2 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 3 years ago
- Detect virtual environment☆62Updated 5 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- ☆19Updated 4 years ago
- Joker Botnet Source LEAKED☆12Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago