dr4k0nia / Origami
Packer compressing .net assemblies, (ab)using the PE format for data storage
☆174Updated 2 years ago
Alternatives and similar repositories for Origami:
Users that are interested in Origami are comparing it to the libraries listed below
- Easy XOR string encryption for NET based binaries☆138Updated last year
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆47Updated 2 years ago
- Various Process Injection Techniques☆148Updated 2 years ago
- A manual system call library that supports functions from both ntdll.dll and win32u.dll☆109Updated 2 years ago
- Universal unpacker and fixer for a number of modded ConfuserEx protections☆105Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆103Updated 2 years ago
- A C# port of the MinHook API hooking library☆212Updated 3 years ago
- Transforms a .NET binary into a chain of meaningless-looking await expressions.☆69Updated 3 months ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆192Updated 8 years ago
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆69Updated 9 months ago
- A .NET malware loader, using API-Hashing to evade static analysis☆207Updated last year
- Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI☆79Updated 3 years ago
- DotNet Obfuscator/Packer☆101Updated 4 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated 2 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆276Updated 6 months ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆202Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆246Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆159Updated last year
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- simple user-mode Rootkit☆103Updated 2 years ago
- Dump .net assembly from a native loader which uses ClrCreateinstance☆55Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆215Updated last year
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆231Updated 9 months ago
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆202Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆110Updated 3 years ago
- Signtool for expired certificates☆475Updated last year
- Obfuscate ECMA CIL (.NET IL) assemblies to evade Windows Defender AMSI☆235Updated last year
- DSE bypass using a leaked cert and adjusting the current clock.☆149Updated 2 years ago