dr4k0nia / OrigamiLinks
Packer compressing .net assemblies, (ab)using the PE format for data storage
☆174Updated 2 years ago
Alternatives and similar repositories for Origami
Users that are interested in Origami are comparing it to the libraries listed below
Sorting:
- Easy XOR string encryption for NET based binaries☆139Updated last year
- A string obfuscator for .NET apps, built to evade static string analysis.☆105Updated 2 years ago
- A Proof-of-Concept implementation for Proxy Object Obfuscation in .NET☆48Updated 2 years ago
- Universal unpacker and fixer for a number of modded ConfuserEx protections☆105Updated 4 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆196Updated 8 years ago
- Learning Process Injection and Hollowing techniques☆41Updated 2 years ago
- Various Process Injection Techniques☆148Updated 3 years ago
- A C# port of the MinHook API hooking library☆215Updated 3 years ago
- Simple tool to extract and decompress embedded resources processed by Fody Costura☆69Updated 11 months ago
- DotNet Obfuscator/Packer☆102Updated 4 years ago
- Fud Runpe Av Evasion / All Av Bypass☆33Updated 2 years ago
- A .NET malware loader, using API-Hashing to evade static analysis☆208Updated 2 years ago
- Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI☆79Updated 3 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆160Updated last year
- Custom GetProcAddress, GetModuleHandleA and some dbghelp.dll functions☆82Updated 6 years ago
- Bootkit for Windows Sandbox to disable DSE/PatchGuard.☆289Updated 8 months ago
- DarksProtector 2.0 | ConfuserEx Modded☆33Updated 4 years ago
- Dump .net assembly from a native loader which uses ClrCreateinstance☆57Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- Process Hollowing in C++ (x86 / x64) - Process PE image replacement☆152Updated last year
- x64 Windows PatchGuard bypass, register process-creation callbacks from unsigned code☆204Updated 4 years ago
- NINA: No Injection, No Allocation x64 Process Injection Technique☆225Updated 5 years ago
- Exploit MsIo vulnerable driver☆106Updated 3 years ago
- Deobfuscator for ConfuserEx☆93Updated 8 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆157Updated 2 years ago
- A C# DLL injection library☆214Updated 4 years ago
- Injecting shellcode into a process memory and executing it in C#☆55Updated 2 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆232Updated 11 months ago
- Hide malware behind a legit process C#☆120Updated 5 years ago