UCRaptor / BE-Bypass
☆17Updated 4 years ago
Alternatives and similar repositories for BE-Bypass:
Users that are interested in BE-Bypass are comparing it to the libraries listed below
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- NT reversal☆25Updated 6 years ago
- ☆35Updated 4 years ago
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- simply manual map any system image☆17Updated 4 years ago
- search for a driver/dll module that has a wanted section bigger than the size of your image☆19Updated 3 years ago
- Injector with kernel power☆16Updated 4 years ago
- Memory Guard Library☆11Updated 4 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- using gpuz to load driver☆33Updated 6 years ago
- x64 assembler library☆31Updated 10 months ago
- ☆29Updated 2 years ago
- ☆15Updated 4 years ago
- win32/x64 obfuscate framework☆32Updated 6 years ago
- [POC Detected]Bypass BE Anti Dll Injection (POC/Need Driver)☆14Updated 5 years ago
- Analysing and defeating PatchGuard universally☆34Updated 4 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- Driver Loader/BE Bypass/Win Malware(lol)☆34Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- bypass CRC☆11Updated 7 years ago
- RET / JMP RBX call spoofer☆10Updated 5 years ago
- P2C Loader based on blackbone, used by isolation.top and others.☆14Updated 7 years ago
- ☆22Updated last year
- Some crazy PE executables protection kernel driver☆18Updated 5 years ago
- Abusing RtlAdjustPrivilege and NtSetInformationProcess to cause a BSOD from usermode☆17Updated 2 years ago
- ☆13Updated 4 years ago
- Illustrates the concept of return address spoofing, and how it is used.☆13Updated 4 years ago
- ☆17Updated 2 years ago
- ☆25Updated 7 years ago
- ☆14Updated 7 years ago