Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.
☆17Oct 10, 2016Updated 9 years ago
Alternatives and similar repositories for Example-Crypter
Users that are interested in Example-Crypter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆71Oct 10, 2016Updated 9 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Makes it easy to associate files with your application☆11Updated this week
- PEAnalyser is an open source PE file analysis tool.☆11Oct 26, 2020Updated 5 years ago
- Easy encoding of numbers to BigEndian, LittleEndian and Varint.☆16Mar 5, 2022Updated 4 years ago
- C# Admin Control Panel Finder For Windows☆45Sep 23, 2019Updated 6 years ago
- Prevent your binary from being analyzed.☆11Jan 3, 2017Updated 9 years ago
- This script make any windows compatible with RDP connection☆22Jul 28, 2025Updated 9 months ago
- Source code of my KeygenMe V7 challenge☆22Jul 19, 2018Updated 7 years ago
- XOR encryption, malware crypter☆97Jan 6, 2014Updated 12 years ago
- Displays PE32 header information for an executable.☆13Jun 13, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- A simple network sniffer in WPF - C#☆12Mar 18, 2019Updated 7 years ago
- ☆42Mar 7, 2017Updated 9 years ago
- GitHub star history graph☆12Jan 29, 2026Updated 3 months ago
- Exploit script for CVE-2020-7961☆18Jan 15, 2021Updated 5 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 7 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- A tool implementing process hollowing making your PE polymorphic☆16Aug 11, 2020Updated 5 years ago
- Find known vulnerabilities in WordPress plugins and themes using Burp Suite proxy. WPScan like plugin for Burp.☆182Jul 30, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆79Jan 30, 2020Updated 6 years ago
- ⚡ An easy way to submit weather reports to the NOAA Citizen's Weather Observer Program☆14Feb 16, 2026Updated 2 months ago
- C# Codedom example / builder☆22Mar 8, 2020Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- A C# irc bot malware POC.☆11Jul 29, 2014Updated 11 years ago
- A python script that converts input character strings to QR Code using emojis. The output can be copied & pasted where desired.☆12Jun 25, 2019Updated 6 years ago
- WhatsApp statistics toolkit mirror☆10Mar 24, 2019Updated 7 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scripts for producing release artefacts and signing, pushing and verifyig them. Note: This is superseded by OpenVPN/openvpn-build.☆11Dec 7, 2022Updated 3 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- Visual Studio extension to show the values of constants where they are used☆24Oct 16, 2025Updated 6 months ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 9 years ago
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 10 years ago