Demos of various (also non standard) persistence methods used by malware
☆224Mar 5, 2023Updated 3 years ago
Alternatives and similar repositories for persistence_demos
Users that are interested in persistence_demos are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆230Mar 22, 2023Updated 3 years ago
- Archive of ransomware decryptors☆34Dec 7, 2017Updated 8 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated 2 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- My implementation of enSilo's Process Doppelganging (PE injection technique)☆639Aug 30, 2022Updated 3 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated last month
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging☆580Mar 8, 2024Updated 2 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆99Jun 24, 2021Updated 4 years ago
- ☆23May 28, 2021Updated 4 years ago
- A modified RunPE (process hollowing) technique avoiding the usage of SetThreadContext by appending a TLS section which calls the original…☆97Sep 26, 2019Updated 6 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- ☆42Apr 22, 2021Updated 4 years ago
- A memory scanning evasion technique☆901May 24, 2017Updated 8 years ago
- Collection of Beacon Object Files (BOF) for Cobalt Strike☆187Dec 5, 2022Updated 3 years ago
- Converts PE into a shellcode☆2,752Aug 30, 2025Updated 6 months ago
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆90Dec 15, 2022Updated 3 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Feb 17, 2014Updated 12 years ago
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆534Jul 2, 2025Updated 8 months ago
- Hellsgate + Halosgate/Tartarosgate. Ensures that all systemcalls go through ntdll.dll☆500Feb 3, 2022Updated 4 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- A library to load, manipulate, dump PE files. See also: https://github.com/hasherezade/libpeconv_tpl☆1,342Mar 7, 2026Updated 2 weeks ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- A ready-made template for a project based on libpeconv.☆52Oct 31, 2025Updated 4 months ago
- Persistent IAT hooking application - based on bearparser☆265Sep 18, 2022Updated 3 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆553Dec 3, 2023Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Cobalt Strike User-Defined Reflective Loader with AV/EDR Evasion in mind☆484Jul 12, 2023Updated 2 years ago
- Obfuscate specific windows apis with different apis☆1,023Feb 21, 2021Updated 5 years ago
- It stinks☆103Apr 22, 2022Updated 3 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆688Mar 11, 2024Updated 2 years ago
- Evasive Process Hollowing Techniques☆142Aug 16, 2020Updated 5 years ago