dr4k0nia / Origami
Packer compressing .net assemblies, (ab)using the PE format for data storage
☆168Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Origami
- Easy XOR string encryption for NET based binaries☆132Updated last year
- A C# port of the MinHook API hooking library☆201Updated 2 years ago
- Universal unpacker and fixer for a number of modded ConfuserEx protections☆99Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆100Updated last year
- Various Process Injection Techniques☆143Updated 2 years ago
- A manual system call library that supports functions from both ntdll.dll and win32u.dll☆107Updated last year
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆127Updated last year
- Learning Process Injection and Hollowing techniques☆40Updated 2 years ago
- Transforms a .NET binary into a chain of meaningless-looking await expressions.☆61Updated 5 months ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆45Updated last year
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆224Updated 4 months ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆154Updated last year
- State of the art DLL injector that took 20 minutes to make☆207Updated last year
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆63Updated 4 months ago
- A console obfuscator for .NET assemblies.☆302Updated 2 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆196Updated 4 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆261Updated last month
- ☆225Updated 2 months ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆186Updated 8 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆156Updated last year
- Inline syscalls made for MSVC supporting x64 and WOW64☆175Updated last year
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆231Updated last year
- A Bumblebee-inspired Crypter☆80Updated last year
- A .NET malware loader, using API-Hashing to evade static analysis☆204Updated last year
- Using Microsoft Warbird to automatically unpack and execute encrypted shellcode in ClipSp.sys without triggering PatchGuard☆239Updated 2 years ago
- A PoC implementation for spoofing arbitrary call stacks when making sys calls (e.g. grabbing a handle via NtOpenProcess)☆431Updated 2 years ago
- A C# DLL injection library☆210Updated 3 years ago
- simple Windows handle hijacker with a nod to Apxaey for inspiration☆201Updated last year
- C# library to load a native DLL from memory without the need to allow unsafe code☆88Updated 5 years ago
- Lenovo Diagnostics Driver EoP - Arbitrary R/W☆169Updated last year