lurak / Polymorphic_engine
☆18Updated 4 years ago
Alternatives and similar repositories for Polymorphic_engine:
Users that are interested in Polymorphic_engine are comparing it to the libraries listed below
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated 11 months ago
- Overwrite MBR and add own custom message☆15Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆12Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 5 months ago
- Infects PE files with a shellcode☆17Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆26Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 2 months ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- Alleged source code leak of Osiris banking trojan☆37Updated 3 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆27Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- TaskMgr Volatile Environment LPE☆13Updated 2 months ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆72Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 2 months ago
- ☆25Updated 2 years ago
- A windows kernel-mode rootkit with remote control☆11Updated 2 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- An example of PE hollowing injection technique☆22Updated 5 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago