ghzcrlvct / AdrenaLinks
Software Protector
☆19Updated 4 years ago
Alternatives and similar repositories for Adrena
Users that are interested in Adrena are comparing it to the libraries listed below
Sorting:
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- ☆13Updated 8 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Криптор на шелл-кодах☆9Updated 5 years ago
- ☆13Updated 4 years ago
- POC runtime crypter☆9Updated 6 years ago
- Скрытие процессов и файлов в user mode☆22Updated 5 years ago
- what the fuck is this shit☆24Updated 9 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- Process Hollowing demonstration & explanation☆35Updated 4 years ago
- Скрытие Win API☆26Updated 5 years ago
- Detect virtual environment☆64Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆29Updated 3 years ago
- .net based packer/obfuscator with apc based pe injection☆15Updated 9 years ago
- Мутация PE x86☆15Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Dll injector POC for new handle stealing technique☆20Updated 7 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Loader and RunPE file executer☆17Updated 6 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆44Updated 3 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 7 years ago