XShar / shell_crypor_framework
Криптор на шелл-кодах
☆10Updated 4 years ago
Alternatives and similar repositories for shell_crypor_framework:
Users that are interested in shell_crypor_framework are comparing it to the libraries listed below
- XssBot-Модульный резидентный бот с супер админкой☆12Updated 2 years ago
- Fud Runpe Av Evasion / All Av Bypass☆32Updated last year
- DarkRats Standalone HVNC☆23Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆28Updated 2 years ago
- A Simple AES Command Line Crypter☆35Updated 2 years ago
- Lime Crypter Obfuscator Mod☆26Updated 7 months ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated last year
- A runtime Crypter written in C++ to bypass AVs signature based detection☆28Updated last year
- This script make any windows compatible with RDP connection☆18Updated 3 weeks ago
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆9Updated 3 years ago
- NanoCore rat stub source code☆34Updated 2 years ago
- Software Protector☆18Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.☆13Updated 3 years ago
- ☆8Updated 2 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆42Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- A tool implementing process hollowing making your PE polymorphic☆14Updated 4 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- HVNC hidden remote VNC desktop with filemanager and backconnect☆40Updated 2 months ago
- C# loader capable of running stage-1 from remote url, file path as well as file share☆17Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆23Updated 2 years ago
- Extracting Syscall Stub, Modernized☆62Updated 2 years ago