XShar / Run_pe_cryptor_frameLinks
Фреймворк криптора/протектора с антиэмуляцией
☆31Updated 6 years ago
Alternatives and similar repositories for Run_pe_cryptor_frame
Users that are interested in Run_pe_cryptor_frame are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆27Updated 5 years ago
- Software Protector☆19Updated 4 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 6 years ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- Мутация PE x86☆15Updated 6 years ago
- Obfuscate calls to imports by patching in stubs☆69Updated 3 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆82Updated 6 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- what the fuck is this shit☆25Updated 9 years ago
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆34Updated 7 years ago
- ☆13Updated 4 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- too busy for that all, furikuri is framework for code protection☆160Updated 5 years ago
- Криптор на шелл-кодах☆10Updated 5 years ago
- A win32 exe packer☆49Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- ☆13Updated 8 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated last year
- stop any process from looking into your process by hooking.☆21Updated last year
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- Infects PE files with a shellcode☆19Updated 6 years ago
- Recreation of GetProcAddress without external dependencies on Windows Libraries☆90Updated 9 years ago
- Elevate a process to be a protected process☆151Updated 5 years ago
- Показывает пароли во вс ех Хромах, включая версии 80 и выше.☆12Updated 5 years ago