SamLarenN / PePacker
Simple PE Packer Which Encrypts .text Section
☆50Updated 7 years ago
Alternatives and similar repositories for PePacker:
Users that are interested in PePacker are comparing it to the libraries listed below
- Process Hollowing demonstration & explanation☆35Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- kernel to user mode APC injector☆44Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆42Updated 7 years ago
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- Header only library for obfuscation import winapi functions.☆39Updated this week
- ☆26Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- ☆58Updated 2 years ago
- Demonstrate calling a kernel function and handle process creation callback against HVCI☆52Updated 2 years ago
- A library with four different methods to execute shellcode in a process☆24Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆54Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆107Updated 3 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated last year
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆23Updated 4 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- ☆18Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- silence file system monitoring components by hooking their minifilters☆54Updated last year
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- ☆22Updated last year
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- Next gen process injection technique☆44Updated 4 years ago
- An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit☆24Updated 3 years ago
- ☆26Updated 7 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year