Convert PE files to a shellcode
☆81May 7, 2020Updated 5 years ago
Alternatives and similar repositories for PE2Shellcode
Users that are interested in PE2Shellcode are comparing it to the libraries listed below
Sorting:
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Remote PE reflective injection with a simple reflective loader☆32Jun 28, 2019Updated 6 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- ☆65Nov 12, 2022Updated 3 years ago
- Simple windows API logger☆109Sep 19, 2019Updated 6 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Dump mapped PE files from memory to the disk☆20Jun 28, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Windows PE - TLS (Thread Local Storage) Injector in C/C++☆108Jan 3, 2021Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Yet another Windows DLL injector.☆40Nov 17, 2021Updated 4 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆45Jun 30, 2013Updated 12 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Мутация PE x86☆16Jun 2, 2019Updated 6 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆26May 12, 2023Updated 2 years ago
- Converts PE into a shellcode☆2,745Aug 30, 2025Updated 5 months ago
- X86 version of syswhispers2 / x86 direct system call☆330Jan 28, 2021Updated 5 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 5 years ago
- Managed code hooking template.☆134Nov 19, 2021Updated 4 years ago
- execute a PE in the address space of another PE aka process hollowing☆60Dec 2, 2021Updated 4 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- ReflectiveDLL☆156Mar 16, 2020Updated 5 years ago
- Run-time loader and patcher☆15Sep 22, 2018Updated 7 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Fast Conversion Windows Dynamic Link Library To ShellCode☆420Mar 10, 2022Updated 3 years ago
- PE loader with various shellcode injection techniques☆449Oct 17, 2022Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆112Oct 11, 2023Updated 2 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Jun 17, 2020Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Jul 31, 2020Updated 5 years ago