lurak / Polymorphic_engineLinks
☆19Updated 5 years ago
Alternatives and similar repositories for Polymorphic_engine
Users that are interested in Polymorphic_engine are comparing it to the libraries listed below
Sorting:
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- An example of PE hollowing injection technique☆25Updated 6 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- A simple polymorphic engine☆44Updated 6 years ago
- Program to leak anti-virus behaviour and such☆14Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆75Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37Updated 10 years ago
- PoC for hiding PE exports☆67Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆32Updated 6 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- Software Protector☆19Updated 5 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- Process injection via KernelCallbackTable☆13Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- A simple rootkit to hide a process☆47Updated 12 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- ☆15Updated 5 years ago
- A collection of anti disassembly techniques☆20Updated 8 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago
- A small library helping to parse commandline parameters (for C/C++)☆58Updated 8 months ago