Demos of various (also non standard) persistence methods used by malware
☆225Mar 5, 2023Updated 3 years ago
Alternatives and similar repositories for persistence_demos
Users that are interested in persistence_demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- A more stealthy variant of "DLL hollowing"☆366Mar 8, 2024Updated 2 years ago
- Set of antianalysis techniques found in malware☆132Aug 25, 2023Updated 2 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆642Aug 30, 2022Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆38Feb 15, 2026Updated last month
- Demos of various injection techniques found in malware☆792Feb 15, 2022Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆581Mar 8, 2024Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆100Jun 24, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- ☆42Apr 22, 2021Updated 4 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆187Dec 5, 2022Updated 3 years ago
- Converts PE into a shellcode☆2,751Aug 30, 2025Updated 7 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆91Dec 15, 2022Updated 3 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆533Jul 2, 2025Updated 9 months ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆503Feb 3, 2022Updated 4 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 7 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,348Updated this week
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆825Aug 23, 2021Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆52Mar 28, 2026Updated 2 weeks ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- KaynLdr is a Reflective Loader written in C/ASM☆552Dec 3, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Obfuscate specific windows apis with different apis☆1,021Feb 21, 2021Updated 5 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- It stinks☆103Apr 22, 2022Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago