Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware
☆30Oct 28, 2019Updated 6 years ago
Alternatives and similar repositories for Vx-Engines
Users that are interested in Vx-Engines are comparing it to the libraries listed below
Sorting:
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆155Mar 11, 2023Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- 基于DXGI、WASAPI、FFMPEG封装的录屏程序,60帧1080p高码率录制cpu占用5%左右☆12Jul 6, 2022Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Cross-platform asynchronous I/O library☆21Apr 12, 2024Updated last year
- Bypass Malware Time Delays☆107Sep 23, 2022Updated 3 years ago
- RunPE Code Injection☆21Dec 16, 2025Updated 3 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆51May 12, 2024Updated last year
- ☆11Dec 26, 2022Updated 3 years ago
- Swiss army knife for payload encryption and obfuscation☆28Jan 22, 2024Updated 2 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- MtE - MuTation Engine☆13Sep 4, 2022Updated 3 years ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Mar 6, 2024Updated 2 years ago
- Decoder for VMProtect hwids☆18Aug 1, 2022Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- Win32 keylogger that supports all (non-ime using) languages correctly☆53Dec 21, 2023Updated 2 years ago
- Convert PE files to a shellcode☆81May 7, 2020Updated 5 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆19Aug 4, 2024Updated last year
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 7 months ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- execute a PE in the address space of another PE aka process hollowing☆60Dec 2, 2021Updated 4 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- ☆38Oct 16, 2025Updated 5 months ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A simple In memory file system written in C☆40Mar 30, 2025Updated 11 months ago
- A simple polymorphic engine☆45Aug 8, 2019Updated 6 years ago
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆185Jan 21, 2024Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Cross-platform proxy resolution library written in C.☆17Mar 2, 2026Updated 2 weeks ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.