SilentVoid13 / Silent_PackerLinks
An ELF / PE binary packer written in pure C, made for fun
☆97Updated last year
Alternatives and similar repositories for Silent_Packer
Users that are interested in Silent_Packer are comparing it to the libraries listed below
Sorting:
- C# implementation to produce ROR-13 numeric hash for given function API name☆33Updated 6 years ago
- Abusing exceptions for code execution.☆111Updated 2 years ago
- A Python script to download PDB files associated with a Portable Executable (PE)☆125Updated 6 months ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆75Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A utility to fix intentionally corrupted UPX packed files.☆90Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆73Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- Files for the packer tutorial☆73Updated 4 years ago
- a PE Loader and Windows API tracer. Useful in malware analysis.☆143Updated 2 years ago
- Hooking the GDT - Installing a Call Gate. POC for Rootkit Arsenal Book Second Edition (version 2022)☆73Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆116Updated 2 years ago
- A command line Windows API tracing tool for Golang binaries.☆157Updated last year
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ☆114Updated 3 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆118Updated last year
- ☆74Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- ☆47Updated 3 years ago
- Windows API Hashes used in the malwares☆42Updated 10 years ago
- ☆147Updated 2 years ago
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆129Updated 4 months ago
- Assembly block for hooking windows API functions.☆93Updated 6 years ago
- A helper utility for creating shellcodes. Cleans MASM file generated by MSVC, gives refactoring hints.☆182Updated 4 months ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆113Updated 3 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆67Updated 3 years ago