mal-project / win32.MetaPHORLinks
Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.
☆26Updated 12 years ago
Alternatives and similar repositories for win32.MetaPHOR
Users that are interested in win32.MetaPHOR are comparing it to the libraries listed below
Sorting:
- Simple Polymorphic Engine (SPE32) is a simple polymorphic engine for encrypting code and data. It is an amateur project that can be used …☆150Updated 2 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆55Updated 3 years ago
- Set of antianalysis techniques found in malware☆131Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆37Updated 10 years ago
- Capture newly created files on Windows☆66Updated 3 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆34Updated 2 years ago
- ☆34Updated 7 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆28Updated 8 years ago
- A simple polymorphic engine☆42Updated 6 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆47Updated 3 months ago
- C Header Only Library for Virii☆12Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆79Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- reconstruct z0mbie's homepage from 2005☆44Updated 3 years ago
- Packer (actually a crypter) for antivirus evasion implemented for windows PE files (BSc-Thesis)☆106Updated 5 years ago
- A simple polymorphic virus that changes its signature whenever it replicates☆12Updated 8 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- PoC designed to evade userland-hooking anti-virus.☆90Updated 6 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆94Updated 6 years ago
- I was challenged by a friend to list all the processes and drivers in a system using more "unusual" methods. By doing this I learned quit…☆14Updated 9 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆190Updated 2 months ago
- ☆72Updated 11 years ago