SilentVoid13 / Silent_PackerLinks
An ELF / PE binary packer written in pure C, made for fun
☆104Updated last year
Alternatives and similar repositories for Silent_Packer
Users that are interested in Silent_Packer are comparing it to the libraries listed below
Sorting:
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆74Updated 2 years ago
- Abusing exceptions for code execution.☆113Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75Updated 4 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆124Updated 10 months ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 4 years ago
- ☆114Updated 3 years ago
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last month
- A command line Windows API tracing tool for Golang binaries.☆158Updated 2 years ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆131Updated 2 months ago
- Add an empty section to a PE file☆53Updated 8 years ago
- Files for the packer tutorial☆75Updated 4 years ago
- C# implementation to produce ROR-13 numeric hash for given function API name☆34Updated 6 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆115Updated 2 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 3 years ago
- Embed an executable as a PE resource, drops and launches it in runtime.☆66Updated 4 years ago
- Windows Kernel Programming Experiments☆81Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆114Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆58Updated 4 years ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆109Updated 4 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆35Updated 2 years ago