Advanced Windows application loader featuring secure authentication, automatic updates, and in-memory PE execution. Built with C++, ImGui, and DirectX 9.
☆20Sep 1, 2025Updated 6 months ago
Alternatives and similar repositories for runpe-loader
Users that are interested in runpe-loader are comparing it to the libraries listed below
Sorting:
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Command line tool to sign ClickOnce manifest with a certificate stored in the Azure Key Vault☆17Aug 15, 2025Updated 6 months ago
- GUI app for Windows to hide Mouse Pointer.☆13Mar 26, 2024Updated last year
- VBS Crypter, Exe To VBS☆15Aug 5, 2022Updated 3 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- A well organized & frequently updated collection of apps that supports material you design/theme.☆19May 21, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Oct 8, 2023Updated 2 years ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆17Mar 14, 2024Updated last year
- EDR & AV Bypass Arsenal— a comprehensive collection of tools, patches, and techniques for evading modern EDR and antivirus defenses.☆57Nov 17, 2025Updated 3 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Website Phishing Source Code☆34Jun 27, 2022Updated 3 years ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆42Apr 7, 2025Updated 10 months ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆78Jul 25, 2025Updated 7 months ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆45May 22, 2025Updated 9 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- A Python-based VBScript Code Obfuscator☆46Dec 2, 2025Updated 3 months ago
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆51Apr 22, 2024Updated last year
- PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282☆53May 27, 2024Updated last year
- A 64 bit executable junk code engine for polymorphic malware.☆76Jun 16, 2025Updated 8 months ago
- Malicious powershell scripts loader designed to avoid detection.☆61Jun 16, 2023Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- Good CLR Host with Native patchless AMSI Bypass☆103Apr 18, 2025Updated 10 months ago
- Simple C# Redirector☆94Aug 31, 2025Updated 6 months ago
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆211Sep 20, 2025Updated 5 months ago
- The best powershell obfuscator ever made☆124Aug 1, 2025Updated 7 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Jan 18, 2025Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆139Apr 27, 2025Updated 10 months ago
- TeamServer and Client of Exploration Command and Control Framework☆176Jan 6, 2026Updated last month
- ☆250Jul 31, 2024Updated last year
- PDF dropper Red Team Scenairos☆228Jul 31, 2024Updated last year
- Nullpoint Stealer Designed To Steal Everything, And Send To Nullpoint Panel.☆168Jun 13, 2025Updated 8 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆298Jul 31, 2024Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆316Sep 30, 2025Updated 5 months ago
- Abusing Azure services over C2☆367Jan 20, 2026Updated last month