levanvn / PE_PackerLinks
Simple Packer PE File
☆15Updated 6 years ago
Alternatives and similar repositories for PE_Packer
Users that are interested in PE_Packer are comparing it to the libraries listed below
Sorting:
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 4 years ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- Add an empty section to a PE file☆51Updated 7 years ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆60Updated 3 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆144Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- windows rootkit☆60Updated last year
- ☆13Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- 2022 Updated Kernelmode-Code☆32Updated last year
- Various Process Injection Techniques☆148Updated 3 years ago
- A x64 PE Packer/Protector Developed in C++ and VisualStudio☆52Updated last year
- Miscellaneous Code and Docs☆81Updated last year
- simple user-mode Rootkit☆104Updated 2 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆60Updated 6 years ago
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Updated 3 years ago
- A simple Windows kernel rootkit.☆92Updated last month
- ☆62Updated last year
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- Set of antianalysis techniques found in malware☆132Updated last year
- Small tool to convert beteween the PE alignments (raw and virtual).☆91Updated 2 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆111Updated 3 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆146Updated 2 years ago
- kernel to user mode APC injector☆45Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆69Updated 3 years ago
- Al-khaser is a PoC malware with good intentions that aimes to stress your malware analysis / sandbox environement☆32Updated 10 years ago