XShar / Run_pe_cryptor_frame
Фреймворк криптора/протектора с антиэмуляцией
☆31Updated 5 years ago
Alternatives and similar repositories for Run_pe_cryptor_frame:
Users that are interested in Run_pe_cryptor_frame are comparing it to the libraries listed below
- Скрытие Win API☆24Updated 5 years ago
- Скрытие процессов и файлов в user mode☆19Updated 5 years ago
- A win32 exe packer☆47Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- Мутация PE x86☆15Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆14Updated 5 years ago
- Class containing Anti-RE, Anti-Debug and Anti-Hook methods. Made for C++/CLI☆104Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- minimal msvc-windows exclusive lazy importer for C++☆32Updated 3 years ago
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- XssBot-Модульный резидентный бот с супер админкой☆12Updated 2 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆79Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- Example Windows Kernel-mode Driver which enumerates running processes.☆55Updated 2 years ago
- DSE & PG bypass via BYOVD attack☆42Updated 10 months ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆67Updated 2 years ago
- Advanced Remote Access Trojan & Server☆36Updated 3 years ago
- A Simple AES Command Line Crypter☆35Updated 2 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆60Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- x64 syscall caller in C++.☆86Updated 6 years ago
- Elevate a process to be a protected process☆144Updated 5 years ago
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆35Updated 7 years ago
- Exploit MsIo vulnerable driver☆92Updated 3 years ago
- PE Header (.rdata,.data,.text) obsfucation☆36Updated 2 years ago
- Hide function calls to prevent reverse-engineering☆68Updated 3 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆17Updated 8 months ago
- ☆120Updated 2 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆55Updated last year
- what the fuck is this shit☆19Updated 9 years ago