killeven / ObjToShellCode
Rapid generation ShellCode
☆60Updated 7 years ago
Alternatives and similar repositories for ObjToShellCode:
Users that are interested in ObjToShellCode are comparing it to the libraries listed below
- From 32-bit process to 64-bit process☆70Updated 3 years ago
- shellcode注入测试工具☆49Updated 5 years ago
- 绕过卡巴斯基主动防御,加载驱动,unhook所有ssdt hook及shadow ssdt hook☆37Updated 9 years ago
- 安全卫士r3工具集☆37Updated 5 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆50Updated 4 years ago
- Windows CVE主防(HIPS/HIDS)☆54Updated 3 years ago
- ☆22Updated 4 years ago
- 一个早期的抗启发式查杀的WIN32免杀壳☆43Updated 11 years ago
- No inline asm,support x86/x64☆64Updated 3 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Penetration test☆55Updated 3 years ago
- 沙箱测试,测评国内常见沙箱的代码与结论☆100Updated 3 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- Search for information from manifests☆44Updated 6 years ago
- dll转shellcode工具☆100Updated 5 years ago
- 反射式注入☆28Updated 5 years ago
- Thanks to all those who helped me.☆20Updated 6 years ago
- 过去写的一些Windows安全研究相关代码☆134Updated 6 years ago
- x64 dll hijacking tool(like AheadLib)☆55Updated 3 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆27Updated 3 years ago
- Small tool to load shellcodes or PEs to analyze them☆81Updated 6 years ago
- Convert PE files to a shellcode☆74Updated 4 years ago
- 模仿操作系统,加载pe文件到内存中☆74Updated 5 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆32Updated last year
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆22Updated 12 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆33Updated 3 years ago
- 感染MBR 下载并运行文件。☆33Updated 2 years ago
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆58Updated 5 years ago
- 加密壳☆33Updated 4 years ago
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago