aeshes / exe_crypterLinks
☆13Updated 8 years ago
Alternatives and similar repositories for exe_crypter
Users that are interested in exe_crypter are comparing it to the libraries listed below
Sorting:
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Updated 8 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- ☆37Updated 6 years ago
- Reflective DLL Injection style process infector☆20Updated 7 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 7 months ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Sysprep Volatile Environment LPE (2017)☆16Updated 7 months ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 3 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- ☆13Updated 9 years ago
- Software Protector☆19Updated 5 years ago
- Various Crypter Project☆55Updated 11 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- ☆34Updated 8 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Updated 7 years ago