XShar / Run_pe_cryptor_frameLinks
Фреймворк криптора/протектора с антиэмуляцией
☆31Updated 5 years ago
Alternatives and similar repositories for Run_pe_cryptor_frame
Users that are interested in Run_pe_cryptor_frame are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆26Updated 5 years ago
- Obfuscate calls to imports by patching in stubs☆68Updated 3 years ago
- Скрытие процессов и файлов в user mode☆21Updated 5 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- minimal msvc-windows exclusive lazy importer for C++☆34Updated 3 years ago
- Elevate a process to be a protected process☆150Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- Мутация PE x86☆15Updated 6 years ago
- Simple x86/x86_64 instruction level obfuscator based on a basic SBI engine☆268Updated 2 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- PAGE_GUARD based hooking library☆46Updated 2 years ago
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆81Updated 6 years ago
- A win32 exe packer☆49Updated 5 years ago
- Library containing Anti-RE and Anti-Debug methods.☆108Updated last month
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- A quick-and-dirty anti-hook library proof of concept.☆104Updated 6 years ago
- A simple tool to assemble shellcode ready to be copy-pasted into code☆68Updated 2 years ago
- Hide function calls to prevent reverse-engineering☆69Updated 4 years ago
- ☆153Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- proof of concept of user-mode anti-breakpoint technique☆15Updated last year
- x64 syscall caller in C++.☆90Updated 6 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆21Updated last year
- ☆121Updated 2 years ago
- Disable Driver Callbacks☆105Updated 7 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆61Updated 2 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- A customizable process dumper.☆142Updated 5 years ago