A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.
☆22Apr 13, 2018Updated 7 years ago
Alternatives and similar repositories for loaderine
Users that are interested in loaderine are comparing it to the libraries listed below
Sorting:
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- A wrapper for capstone for bearparser☆16Oct 8, 2025Updated 5 months ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 7 months ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 3 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- A template for projects using both libPeConv and MS Detours☆16Oct 5, 2025Updated 5 months ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- ☆23May 28, 2021Updated 4 years ago
- My small projects writen in 16 bit asm (NOTE: those are my practice projects that I wrote when I was 15, I give no warranty for this code…☆23Oct 14, 2021Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Apr 14, 2022Updated 3 years ago
- ☆84Aug 26, 2024Updated last year
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- BetaShield Windows x86 Ring3 Anticheat v2☆42Jan 11, 2017Updated 9 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- This is a simple tool to remove the "Rich" header from binaries (EXE or DLL files) created by M$ development tools.☆33Feb 3, 2021Updated 5 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- Cross platform C++ template-based IPC library.☆11Jul 14, 2022Updated 3 years ago
- Bypass User Account Control by manipulating tokens☆35Nov 3, 2017Updated 8 years ago
- ☆17Feb 29, 2020Updated 6 years ago