lurak / Polymorphic_engine
☆19Updated 4 years ago
Alternatives and similar repositories for Polymorphic_engine
Users that are interested in Polymorphic_engine are comparing it to the libraries listed below
Sorting:
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Run shellcode via EnumDesktopsA. C++ implementation☆13Updated 2 years ago
- DarkRat source - beware untested source and resources.☆21Updated 5 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 10 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 6 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Dump mapped PE files from memory to the disk☆20Updated 5 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 5 months ago
- Just another casual shellcode native loader☆24Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Updated 5 years ago