XShar / Run_pe_cryptor_frameLinks
Фреймворк криптора/протектора с антиэмуляцией
☆31Updated 6 years ago
Alternatives and similar repositories for Run_pe_cryptor_frame
Users that are interested in Run_pe_cryptor_frame are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆26Updated 5 years ago
- Скрытие процессов и файлов в user mode☆22Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- Obfuscate calls to imports by patching in stubs☆69Updated 3 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Мутация PE x86☆15Updated 6 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- A win32 exe packer☆49Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- x64 syscall caller in C++.☆90Updated 7 years ago
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆34Updated 7 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Updated last year
- Manual PE image mapper☆65Updated 11 years ago
- VBS files to encrypt and decrypt VBE files☆9Updated 3 years ago
- Disable Driver Callbacks☆105Updated 7 years ago
- Library containing Anti-RE and Anti-Debug methods.☆109Updated last month
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- Header only library for obfuscation import winapi functions.☆41Updated 4 months ago
- PE-Dump-Fixer☆108Updated 5 years ago
- Криптор на шелл-кодах☆9Updated 5 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 3 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆22Updated last year
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆271Updated 2 years ago
- Exploit MsIo vulnerable driver☆106Updated 3 years ago
- Hide function calls to prevent reverse-engineering☆71Updated 4 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆82Updated 6 years ago