ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports payload-side
☆230Mar 22, 2023Updated 3 years ago
Alternatives and similar repositories for chimera_pe
Users that are interested in chimera_pe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A more stealthy variant of "DLL hollowing"☆366Mar 8, 2024Updated 2 years ago
- Demos of various (also non standard) persistence methods used by malware☆225Mar 5, 2023Updated 3 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆642Aug 30, 2022Updated 3 years ago
- User-mode hook bypassing method☆33Aug 26, 2016Updated 9 years ago
- Demos of various injection techniques found in malware☆792Feb 15, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Jun 24, 2021Updated 4 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆16Sep 7, 2017Updated 8 years ago
- Process Doppelgänging☆162Dec 19, 2017Updated 8 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- Some source code to demonstrate avoiding certain direct syscall detections by locating and JMPing to a legitimate syscall instruction wit…☆218Feb 20, 2023Updated 3 years ago
- Simple runtime crypter in C/C++.☆166Oct 3, 2015Updated 10 years ago
- codes for my blog post: https://secrary.com/Random/InstrumentationCallback/☆182Nov 30, 2017Updated 8 years ago
- simple PE packer written in C++☆56Feb 23, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- Just another Windows Process Injection☆409Aug 7, 2020Updated 5 years ago
- Lightweight Portable Executable parsing library and a demo peParser application.☆81Jan 5, 2023Updated 3 years ago
- ☆19Jul 20, 2015Updated 10 years ago
- Reflective PE loader for DLL injection☆187Oct 12, 2017Updated 8 years ago
- PE permutation library☆278Apr 8, 2023Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Inject code into a legitimate process☆147Dec 9, 2014Updated 11 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 8 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Aug 12, 2015Updated 10 years ago
- A library for loading dll module bypassing windows PE loader from memory (x86/x64)☆583Updated this week
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,348Updated this week
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 9 months ago
- Software Distribution Service☆12Jul 2, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 7 months ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆827Mar 10, 2022Updated 4 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Translates WinDbg "dt" structure dump to a C structure☆133Oct 16, 2016Updated 9 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆105May 14, 2020Updated 5 years ago
- Shareds for kernel developement☆29Dec 23, 2013Updated 12 years ago