XShar / Run_pe_cryptor_frameLinks
Фреймворк криптора/протектора с антиэмуляцией
☆31Updated 6 years ago
Alternatives and similar repositories for Run_pe_cryptor_frame
Users that are interested in Run_pe_cryptor_frame are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆27Updated 6 years ago
- Мутация PE x86☆16Updated 6 years ago
- A Simple AES Command Line Crypter☆40Updated 3 years ago
- Скрытие процессов и файлов в user mode☆24Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Software Protector☆19Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- what the fuck is this shit☆25Updated 10 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆86Updated 6 years ago
- Obfuscate calls to imports by patching in stubs☆72Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- too busy for that all, furikuri is framework for code protection☆164Updated 6 years ago
- ☆15Updated 5 years ago
- Крипт ор на шелл-кодах☆11Updated 5 years ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- A simple Windows kernel rootkit.☆96Updated 8 months ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Updated 6 years ago
- LSASS INJECTOR☆35Updated 7 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆31Updated last year
- This is a simple mutation engine. It does not have many features and you have to add actual mutation, when you want to use it - It does m…☆36Updated 8 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated 2 years ago
- A library with four different methods to execute shellcode in a process☆26Updated 5 years ago
- Inject dll to explorer.exe and hide file from process.☆23Updated 4 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- A win32 exe packer☆48Updated 5 years ago