A runtime Crypter written in C++ to bypass AVs signature based detection
☆40Apr 7, 2023Updated 2 years ago
Alternatives and similar repositories for PE-Runtime-Crypter
Users that are interested in PE-Runtime-Crypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆17Jul 6, 2021Updated 4 years ago
- A simple script to obfuscate batch(bat) code easily☆26Oct 21, 2023Updated 2 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- Threat Hijacking Simple Implementation☆20Feb 24, 2025Updated last year
- Black cat magic ฅ(^・ω・^ฅ ✿)☆55Sep 28, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 9 months ago
- ☆12Jan 30, 2019Updated 7 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- MtE - MuTation Engine☆13Sep 4, 2022Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 6 months ago
- shellcode transformation tool for YARA evasion☆58Dec 17, 2025Updated 3 months ago
- pdf-js-inject,能够将js代码注入到pdf文件中,也可以注入xss-payload到pdf文件中☆31Sep 8, 2024Updated last year
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆29Mar 26, 2023Updated 3 years ago
- Sample of windows key logger.☆14Dec 27, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- A simple website to act as a store for havoc modules and extensions☆29Jan 20, 2025Updated last year
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- c3's c++ game project: a text-based space adventure☆10Mar 17, 2017Updated 9 years ago
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆29Aug 5, 2019Updated 6 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Mar 4, 2024Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- XOR encryption, malware crypter☆97Jan 6, 2014Updated 12 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 6 months ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A gadget for converting PE files to shellcode.☆15Jan 9, 2020Updated 6 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Jul 12, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- A Go client to receive real-time data messages from Polymarket☆12Jun 25, 2025Updated 9 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- A Python-based VBScript Code Obfuscator☆46Dec 2, 2025Updated 3 months ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year