cdong1012 / Malware-Packer
☆11Updated 4 years ago
Alternatives and similar repositories for Malware-Packer:
Users that are interested in Malware-Packer are comparing it to the libraries listed below
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- 2022 Updated Kernelmode-Code☆31Updated 11 months ago
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆21Updated last year
- Tiny driver patch to allow kernel callbacks to work on Win10 21h1☆34Updated 3 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆17Updated 3 years ago
- Process Hollowing POC in CPP☆15Updated 4 years ago
- Process Hollowing Detection on a live system☆13Updated 7 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- Infects PE files with a shellcode☆17Updated 6 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 5 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- Proof of concept memory anti-forensic toolkit designed for hiding various artifacts inside the memory dump during memory acquisition on M…☆10Updated 5 years ago
- Loader and RunPE file executer☆17Updated 5 years ago