levanvn / PE_Packer
Simple Packer PE File
☆15Updated 6 years ago
Alternatives and similar repositories for PE_Packer
Users that are interested in PE_Packer are comparing it to the libraries listed below
Sorting:
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆57Updated 3 years ago
- Windows process injection methods☆16Updated 3 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- 2022 Updated Kernelmode-Code☆31Updated last year
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆87Updated 2 years ago
- ☆13Updated 4 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆51Updated last year
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆143Updated 2 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Miscellaneous Code and Docs☆81Updated last year
- what the fuck is this shit☆24Updated 9 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 3 years ago
- kernel to user mode APC injector☆44Updated 3 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆143Updated 2 years ago
- ☆61Updated last year
- GetModuleHandle (via PEB) and GetProcAddress (via EAT) like☆32Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆92Updated 4 years ago
- ☆12Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- ☆71Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago