lurak / Polymorphic_engine
☆18Updated 4 years ago
Alternatives and similar repositories for Polymorphic_engine:
Users that are interested in Polymorphic_engine are comparing it to the libraries listed below
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- Multipurpose malware framework☆23Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 4 months ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆11Updated last month
- Collection of shellcode injection and execution techniques☆16Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 4 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Overwrite MBR and add own custom message☆14Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated last year
- Neutralize KEPServerEX anti-debugging techniques☆31Updated last year
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Remote PE reflective injection with a simple reflective loader☆30Updated 5 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆28Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Helper Script to convert a Windbg dumped structure (using the 'dt' command) into a C structure. It creates dummy structs for you if neede…☆26Updated last year
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated 10 months ago
- Dump mapped PE files from memory to the disk☆18Updated 5 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago