m0n0ph1 / Crypters
Various Crypter Project
☆11Updated 11 years ago
Alternatives and similar repositories for Crypters
Users that are interested in Crypters are comparing it to the libraries listed below
Sorting:
- Various Crypter Project☆51Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Analysis and Modification Tool for Executables☆16Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 5 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 5 months ago
- Code Injector Using Code Caves☆14Updated 9 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- Zerokit shared code☆16Updated 6 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆16Updated 9 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Capture Webcam Reflective Dll☆8Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- Component Services Volatile Environment LPE☆11Updated 5 months ago
- This is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks☆33Updated 8 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Just some sources from forever ago (none were made by me)☆7Updated 6 years ago
- Ip Transmitter.☆7Updated 8 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago