kgretzky / python-x86-obfuscatorLinks
This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.
☆240Updated 9 years ago
Alternatives and similar repositories for python-x86-obfuscator
Users that are interested in python-x86-obfuscator are comparing it to the libraries listed below
Sorting:
- Cminer is a tool for enumerating the code caves in PE files.☆152Updated 2 years ago
- Search for code cave in all binaries☆282Updated last year
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆379Updated 8 years ago
- Demos of various (also non standard) persistence methods used by malware☆222Updated 2 years ago
- Carberp Banking Trojan☆117Updated 10 years ago
- Patching ROP-encoded shellcodes into PEs☆187Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆324Updated 3 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆223Updated 2 years ago
- A set of tutorials about code injection for Windows.☆312Updated 10 months ago
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- An extensible framework for easily writing compiler optimized position independent x86 / x64 shellcode for windows platforms.☆522Updated 2 weeks ago
- Teaching old shellcode new tricks☆205Updated 7 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-e…☆308Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆314Updated 7 years ago
- A utility to use the usermode shellcode from the DOUBLEPULSAR payload to reflectively load an arbitrary DLL into another process, for use…☆118Updated 8 years ago
- DLL Injection tool to unlock guest VMs☆237Updated 12 years ago
- An improvement of the original reflective DLL injection technique by Stephen Fewer of Harmony Security☆333Updated 7 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆496Updated 7 years ago
- Simple runtime crypter in C/C++.☆164Updated 9 years ago
- Inject code into a legitimate process☆144Updated 10 years ago
- Universal Unhooking☆321Updated 6 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆184Updated 6 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated 11 months ago
- ☆401Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆133Updated 4 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- Capcom Rootkit POC☆196Updated 8 years ago