hasherezade / exe_to_dll
Converts a EXE into DLL
☆1,305Updated last week
Alternatives and similar repositories for exe_to_dll
Users that are interested in exe_to_dll are comparing it to the libraries listed below
Sorting:
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆902Updated 3 years ago
- Converts PE into a shellcode☆2,537Updated last year
- Run a Exe File (PE Module) in memory (like an Application Loader)☆896Updated 4 years ago
- AV/EDR evasion via direct system calls.☆1,870Updated 2 years ago
- AV/EDR evasion via direct system calls.☆1,663Updated 2 years ago
- Original C Implementation of the Hell's Gate VX Technique☆1,041Updated 3 years ago
- x64 binary obfuscator☆1,816Updated last year
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,217Updated 2 months ago
- C/C++ source obfuscator for antivirus bypass☆1,032Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,276Updated last year
- Converts a DLL into EXE☆811Updated last year
- Open-Source Shellcode & PE Packer☆1,947Updated last year
- A Pin Tool for tracing API calls etc☆1,424Updated 2 weeks ago
- Reflective PE packer.☆1,286Updated last year
- Exploiting DLL Hijacking by DLL Proxying Super Easily☆506Updated last year
- Tool to bypass LSA Protection (aka Protected Process Light)☆944Updated 2 years ago
- A tool to kill antimalware protected processes☆1,442Updated 3 years ago
- This program is designed to demonstrate various process injection techniques☆1,144Updated last year
- Win32 and Kernel abusing techniques for pentesters☆950Updated last year
- 🇺🇦 Windows driver with usermode interface which can hide processes, file-system and registry objects, protect processes and etc☆1,904Updated 2 years ago
- A modern 32/64-bit position independent implant template☆1,210Updated last month
- PE-bear (builds only)☆778Updated last year
- Obfuscate specific windows apis with different apis☆999Updated 4 years ago
- Now You See Me, Now You Don't☆939Updated 4 months ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆658Updated last year
- Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading☆799Updated 4 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Pools☆1,098Updated last year
- Stop Windows Defender programmatically☆969Updated 2 years ago
- proof-of-concept Windows Driver for injecting DLL into user-mode processes using APC☆1,217Updated last year
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,423Updated 9 months ago