fcccode / Vx-Engines
Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware
☆26Updated 5 years ago
Alternatives and similar repositories for Vx-Engines:
Users that are interested in Vx-Engines are comparing it to the libraries listed below
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- ☆34Updated last year
- XssBot-Модульный резидентный бот с супер админкой☆12Updated 2 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- A simple example on how to initiate a direct syscall on WoW64☆11Updated 7 years ago
- ☆16Updated 3 years ago
- a stage1 DLL loader with sleep obfuscation☆35Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Piece of code to detect and remove hooks in IAT☆63Updated 2 years ago
- Next gen process injection technique☆45Updated 4 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated 10 months ago
- 2022 Updated Kernelmode-Code☆31Updated last year
- using the gpu to hide your payload☆56Updated 2 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- ☆107Updated 2 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆98Updated last year
- Manually perform syscalls without going through any external API or DLL.☆18Updated last year
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆109Updated 3 years ago
- improving zerosums smbdoor - a silent remote backdoor which abuses undoc. APIs in srvnet.sys☆49Updated 2 years ago
- Reimplementation of the KExecDD DSE bypass technique.☆47Updated 6 months ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- A novel technique to communicate between threads using the standard ETHREAD structure☆110Updated 4 years ago
- PoC of a UEFI Petya ransomware☆41Updated 2 years ago
- ☆71Updated last year
- ☆82Updated 7 months ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆15Updated 9 months ago