TheComet / polymorhpic-crypterLinks
what the fuck is this shit
☆25Updated 9 years ago
Alternatives and similar repositories for polymorhpic-crypter
Users that are interested in polymorhpic-crypter are comparing it to the libraries listed below
Sorting:
- Software Protector☆19Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Скрытие Win API☆27Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆30Updated 4 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- ☆13Updated 4 years ago
- Infects PE files with a shellcode☆19Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆16Updated 6 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- Мутация PE x86☆16Updated 6 years ago
- A simple Windows kernel rootkit.☆92Updated 2 months ago
- kernel to user mode APC injector☆45Updated 3 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Updated 2 years ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- ⚙️ Map and execute EXE in memory☆11Updated 2 years ago
- Hooking Shadow and normal SSDT with Kaspersky Hypervisor and abusing alignment☆25Updated 4 years ago
- silence file system monitoring components by hooking their minifilters☆58Updated last year
- Signature finder (from PE-bear)☆36Updated 3 months ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆23Updated last year
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆11Updated 4 years ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago