akuafif / hXOR-Packer
A PE (Portable Executable) packer with Huffman Compression and Xor encryption.
☆57Updated 3 years ago
Alternatives and similar repositories for hXOR-Packer:
Users that are interested in hXOR-Packer are comparing it to the libraries listed below
- Reverse engineering winapi function loadlibrary.☆79Updated last year
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- Collection of DLL function export forwards for DLL export function proxying☆91Updated last year
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆51Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆104Updated last year
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆106Updated 2 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆69Updated 2 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆84Updated last year
- Easy XOR string encryption for NET based binaries☆133Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆89Updated 7 months ago
- Various Process Injection Techniques☆146Updated 2 years ago
- Add an empty section to a PE file☆52Updated 7 years ago
- Finding Truth in the Shadows☆85Updated last year
- ☆105Updated 2 years ago
- PoC: Rebuild A New Path Back to the Heaven's Gate (HITB 2021)☆102Updated 3 years ago
- Small tool to convert beteween the PE alignments (raw and virtual).☆83Updated 2 years ago
- ☆65Updated last year
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆155Updated last year
- Uses Threat-Intelligence ETW events to identify shellcode regions being hidden by fluctuating memory protections☆106Updated last year
- Next gen process injection technique☆43Updated 4 years ago
- 2022 Updated Kernelmode-Code☆31Updated 9 months ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆86Updated last year
- Small PoC of using a Microsoft signed executable as a lolbin.☆133Updated last year
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆226Updated 6 months ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆130Updated last year
- ☆109Updated 2 years ago
- silence file system monitoring components by hooking their minifilters☆55Updated 11 months ago
- Walks the CFG bitmap to find previously executable but currently hidden shellcode regions☆105Updated last year
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 3 years ago