loreloc / mkpoly
A simple polymorphic engine
☆42Updated 5 years ago
Alternatives and similar repositories for mkpoly
Users that are interested in mkpoly are comparing it to the libraries listed below
Sorting:
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆143Updated 2 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Updated 9 years ago
- ☆19Updated 4 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆71Updated 3 years ago
- metamorphic engine in python☆35Updated 8 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆91Updated 6 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆83Updated 14 years ago
- A set of small utilities, helpers for PIN tracers☆33Updated last year
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆75Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- This is a simple driver with x64 inline assembly☆55Updated 4 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- arbitrary kernel read/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆57Updated 3 years ago
- a binary x86win32 code obfuscator using virtual machine☆32Updated 8 years ago
- Simple Packer PE File☆15Updated 6 years ago
- A process overwriting its own PEB to make an illusion that it has been loaded from a different path.☆96Updated 3 years ago
- Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler☆28Updated 3 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- A C polymorphic and metamorphic engine☆68Updated 6 years ago
- An automatic tool for fixing dumped PE files☆41Updated 4 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆48Updated 10 years ago
- PoC for hiding PE exports☆66Updated 4 years ago
- Miscellaneous Code and Docs☆81Updated last year
- Gozi-MBR-rootkit Bootkit Modified☆68Updated 8 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated last year
- A Simple AES Command Line Crypter☆36Updated 2 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago