m0n0ph1 / Crypters
Various Crypter Project
☆11Updated 10 years ago
Alternatives and similar repositories for Crypters:
Users that are interested in Crypters are comparing it to the libraries listed below
- Various Crypter Project☆52Updated 10 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- If you want to exploit some kernel overflows, I've designed (long time ago) several levels ; have fun!☆8Updated 12 years ago
- ☆26Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Debugger checks in 3 ways☆18Updated 6 years ago
- AxSuite is a toolset aimed to retrieve in-memory secrets saved by AxCrypt☆11Updated 4 years ago
- A simple exploitable ActiveX control for RE/VR☆18Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Various libraries focused on examining/parsing NTFS-specific structures☆16Updated 9 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- Capture Webcam Reflective Dll☆8Updated 8 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 9 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Updated 13 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- Ip Transmitter.☆7Updated 8 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Updated 9 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Archive of ransomware decryptors☆29Updated 7 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆19Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆11Updated last month
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Scanner for Regin Virtual Filesystems☆26Updated 9 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆11Updated 7 years ago
- Framework complet d'analyse de malware☆12Updated 8 years ago