☆13Apr 1, 2017Updated 8 years ago
Alternatives and similar repositories for exe_crypter
Users that are interested in exe_crypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Tool to extract metamask vault hash☆12Nov 3, 2024Updated last year
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 6 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Показывает пароли во всех Хромах, включая версии 80 и выше.☆12May 23, 2020Updated 5 years ago
- RunPE Code Injection☆21Dec 16, 2025Updated 3 months ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Jul 31, 2018Updated 7 years ago
- Simple PE packer with RtlCompressBuffer☆21Sep 20, 2015Updated 10 years ago
- Resolve offsets, gadgets and symbols from NTKernel☆56Jan 15, 2026Updated 2 months ago
- ☆16Dec 31, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- this is a server sided obfuscator base, where you login, select the options, upload the file to the server and it obfuscates it☆13May 9, 2020Updated 5 years ago
- Скрытие Win API☆27Aug 14, 2019Updated 6 years ago
- ⚙️ Map and execute EXE in memory☆12Dec 23, 2022Updated 3 years ago
- GNURadio OOT module for decoding KeeLoq transmitters.☆10Jun 30, 2017Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- ☆13Jan 28, 2017Updated 9 years ago