m0n0ph1 / FileCrypter
Encrypting and decrypting files with AES or RC4 on Microsoft Windows
☆37Updated 11 years ago
Alternatives and similar repositories for FileCrypter:
Users that are interested in FileCrypter are comparing it to the libraries listed below
- Yet another Windows DLL injector.☆38Updated 3 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Windows Sandbox Framework☆37Updated 3 years ago
- Reverse Socks5 proxy for windows☆13Updated 2 years ago
- ☆26Updated 7 years ago
- Projects I did during the reading of @zodiacon's Windows Kernel Programming book☆10Updated 4 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆51Updated 4 years ago
- Rookit and anti rookit on Windows platform☆12Updated 11 months ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Anti-Analysis technique, trick the debugger by Hiding events from it.☆19Updated 3 years ago
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆14Updated 4 years ago
- ☆33Updated 3 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16Updated 2 years ago
- Collection of Win32 with C++/Assembly for Hooking, Patch and Reversing PE file☆12Updated 2 years ago
- Load Dll into Kernel space☆38Updated 2 years ago
- Process Hollowing Packer☆26Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Updated 3 years ago
- Record & prevent file deletion in kernel mode☆42Updated 4 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆26Updated 3 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Updated 5 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆22Updated last year
- Load Encrypted Dll Using LoadLibraryA, Keep The Dll Encrypted on disc all the time and decrypt it only in memory.☆18Updated 3 years ago
- A kernel mode Windows rootkit in development.☆48Updated 3 years ago
- A simple tool for detecting memory modifications to Windows API.☆22Updated 3 months ago
- Open-source EDR kernel-component for system monitoring and DLL injection☆31Updated 4 years ago
- Using Thread Description To Hide Shellcodes☆14Updated 2 years ago
- A PoC tool for exploiting leaked process and thread handles☆30Updated last year