mal-project / win32.MetaPHORLinks
Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.
☆28Updated 11 years ago
Alternatives and similar repositories for win32.MetaPHOR
Users that are interested in win32.MetaPHOR are comparing it to the libraries listed below
Sorting:
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆148Updated 2 years ago
- Set of antianalysis techniques found in malware☆131Updated last year
- Vxheaven.org website's mirror☆171Updated 7 years ago
- reconstruct z0mbie's homepage from 2005☆43Updated 3 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆90Updated last year
- Capture newly created files on Windows☆66Updated 3 years ago
- Inject code into a legitimate process☆145Updated 10 years ago
- Metadata hash incorporating the Rich Header for robustness against packing and other malware tricks☆67Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 5 years ago
- ☆34Updated 7 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆45Updated last month
- ELF packer/crypter that aims to create hardened and stealthy troyans☆54Updated 3 years ago
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆64Updated 3 years ago
- A simple polymorphic engine☆42Updated 6 years ago
- An ELF / PE binary packer written in pure C, made for fun☆96Updated last year
- Blackhat 2012 Sample Codes☆93Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆31Updated 8 years ago
- Full DLL Hooking, phrack 65☆53Updated 2 years ago
- BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)☆125Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆54Updated this week
- MASM32 Code collection for reverse engineers☆159Updated 11 months ago
- Assembly language files and Shellcode☆34Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆38Updated 10 years ago
- A C polymorphic and metamorphic engine☆70Updated 6 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆104Updated 5 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆34Updated 2 years ago
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Updated 9 years ago