fcccode / Vx-Engines
Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware
☆25Updated 5 years ago
Alternatives and similar repositories for Vx-Engines:
Users that are interested in Vx-Engines are comparing it to the libraries listed below
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Process Hollowing demonstration & explanation☆34Updated 3 years ago
- A simple example on how to initiate a direct syscall on WoW64☆11Updated 6 years ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- XssBot-Модульный резидентный бот с супер админкой☆12Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 8 months ago
- A attempt at replicating BLACKLOTUS capabilities, whilst not acting as a direct mimic.☆87Updated last year
- C++ Multi-Stage Semi-Polymorphic Malware Loader.☆8Updated 3 years ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆95Updated last year
- 2022 Updated Kernelmode-Code☆31Updated 10 months ago
- ☆27Updated 10 months ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- ☆15Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆106Updated 2 years ago
- a stage1 DLL loader with sleep obfuscation☆34Updated 2 years ago
- Next gen process injection technique☆44Updated 4 years ago
- ☆105Updated 2 years ago
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆9Updated last year
- A proof of concept I developed to improve Gargoyle back in 2018 to achieve true memory obfuscation from position independent code☆43Updated 4 months ago
- Manually perform syscalls without going through any external API or DLL.☆17Updated last year
- user-mode Rootkit☆102Updated 2 years ago
- Piece of code to detect and remove hooks in IAT☆62Updated 2 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆14Updated 7 months ago
- An example of COM hijacking using a proxy DLL.☆25Updated 3 years ago
- 💻 Windows 10 Kernel-mode rootkit☆31Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆81Updated last year
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆25Updated last year