XShar / Run_pe_cryptor_x64
Криптор с антиэмуляцией и полиморфизмом для x64
☆14Updated 5 years ago
Alternatives and similar repositories for Run_pe_cryptor_x64:
Users that are interested in Run_pe_cryptor_x64 are comparing it to the libraries listed below
- Скрытие Win API☆25Updated 5 years ago
- Мутация PE x86☆15Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- win32/x64 obfuscate framework☆32Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- MazzCrypt - You won't ever get caught. A [was-private] polymorphic source code parser to randomize executables. Inspired by PolyLoader by…☆12Updated 8 years ago
- Polymorphic Stub Creator☆32Updated 7 years ago
- Program to leak anti-virus behaviour and such☆15Updated 5 years ago
- Stealthy Injector that leverages a vulnerable driver and other exploits to remain undetected☆36Updated 6 years ago
- Software Protector☆18Updated 4 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- driver interface with dll-injection capabilities☆28Updated 4 years ago
- Library for using direct system calls☆35Updated 2 months ago
- Injector with kernel power☆16Updated 4 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- NT reversal☆25Updated 6 years ago
- Dll injector POC for new handle stealing technique☆20Updated 7 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Updated 4 years ago
- Fake Timestamps of Driver Certificates while keeping validity.☆17Updated 3 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- using gpuz to load driver☆33Updated 6 years ago
- Walks the Process' VAD list to grab the PTE's corresponding to a usermode virtual address, all to get the physical address☆24Updated 3 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- ☆17Updated 4 years ago
- ☆14Updated 6 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆26Updated 6 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Updated 7 years ago
- simply manual map any system image☆16Updated 4 years ago