Souhardya / IMProtectorLinks
Old 32 bit PE executable protector / crypter
☆15Updated 4 years ago
Alternatives and similar repositories for IMProtector
Users that are interested in IMProtector are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆27Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Updated 6 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆37Updated 7 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- A resource for thread hijacking and manual mapping code, that works with MEM_MAPPED & MEM_IMAGE.☆26Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- ☆26Updated 8 years ago
- ☆15Updated 5 years ago
- hook system call that on user mode☆12Updated 3 years ago
- D☆43Updated 4 years ago
- Malware Development☆10Updated 5 years ago
- Polymorphic Stub Creator☆34Updated 8 years ago
- Мутация PE x86☆16Updated 6 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- ☆24Updated 6 years ago
- Some garbage drivers written for getting started☆66Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Inject dll to explorer.exe and hide file from process.☆23Updated 4 years ago
- Hook NtDeviceIoControlFile with PatchGuard☆107Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Bypasses for Windows kernel callbacks PatchGuard protection☆44Updated 4 years ago
- Obfuscate calls to imports by patching in stubs☆71Updated 4 years ago
- Software Protector☆19Updated 5 years ago
- Injector with kernel power☆17Updated 5 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Updated 11 years ago
- simply manual map any system image☆18Updated 4 years ago
- A library with four different methods to execute shellcode in a process☆26Updated 5 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆26Updated 5 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆13Updated 9 years ago
- Fully Functional MS17-10 EternalBlue Exploit Written in C++ on windows for windows☆14Updated 5 years ago