TheComet / polymorhpic-crypter
what the fuck is this shit
☆24Updated 9 years ago
Alternatives and similar repositories for polymorhpic-crypter
Users that are interested in polymorhpic-crypter are comparing it to the libraries listed below
Sorting:
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- Software Protector☆19Updated 4 years ago
- Скрытие процессов и файлов в user mode☆21Updated 5 years ago
- ☆13Updated 4 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- ☆13Updated 8 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Мутация PE x86☆15Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- Криптор на шелл-кодах☆10Updated 5 years ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- ⚙️ Map and execute EXE in memory☆10Updated 2 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Скрытие Win API☆25Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- a windows kernel keylogger that works☆20Updated last year
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- stop any process from looking into your process by hooking.☆17Updated last year
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆21Updated 11 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆24Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 3 years ago