ghzcrlvct / AdrenaLinks
Software Protector
☆19Updated 5 years ago
Alternatives and similar repositories for Adrena
Users that are interested in Adrena are comparing it to the libraries listed below
Sorting:
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Updated 6 years ago
- A Simple AES Command Line Crypter☆37Updated 2 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- ☆13Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆73Updated 4 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- Скрытие Win API☆27Updated 6 years ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Updated 3 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Updated 6 years ago
- Infects PE files with a shellcode☆19Updated 6 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- ☆13Updated 8 years ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- UAC Bypass for windows☆37Updated 5 years ago
- Мутация PE x86☆16Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 3 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆43Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- Detect virtual environment☆66Updated 6 years ago