SamLarenN / PePacker
Simple PE Packer Which Encrypts .text Section
☆49Updated 7 years ago
Alternatives and similar repositories for PePacker:
Users that are interested in PePacker are comparing it to the libraries listed below
- Process Hollowing demonstration & explanation☆34Updated 3 years ago
- A library with four different methods to execute shellcode in a process☆24Updated 4 years ago
- APC DLL Injector with NtQueueApcThread and wake up thread support☆45Updated 7 years ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- kernel to user mode APC injector☆44Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆106Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆27Updated 3 years ago
- silence file system monitoring components by hooking their minifilters☆55Updated 11 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Clone running process with ZwCreateProcess☆58Updated 4 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆49Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆89Updated 7 months ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- ☆58Updated 2 years ago
- Exploits Intel's signed iqvw64e.sys driver to allow manual mapping and read/writing of memory at a kernel level.☆13Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- NO WriteProcessMemory CreateRemoteThread APIs call shellcode injection☆27Updated 4 years ago
- ☆15Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Dynamically generated obfuscated jumps and/or function calls☆34Updated last year
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆55Updated 3 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- A ready-made template for a project based on libpeconv.☆43Updated 3 months ago
- Parser for a custom executable format from Hidden Bee malware (first stage)