marcusbotacin / Dropper
Embed an executable as a PE resource, drops and launches it in runtime.
☆57Updated 3 years ago
Alternatives and similar repositories for Dropper:
Users that are interested in Dropper are comparing it to the libraries listed below
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆99Updated last year
- Windows (ShadowMove) Socket Duplication☆80Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆99Updated 2 years ago
- A Bumblebee-inspired Crypter☆80Updated 2 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆48Updated 2 years ago
- ☆85Updated 2 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆46Updated 8 months ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆61Updated last year
- Overwrite a process's recovery callback and execute with WER☆102Updated 2 years ago
- Enabled / Disable LSA Protection via BYOVD☆65Updated 3 years ago
- ☆110Updated 2 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆60Updated last year
- ☆27Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆53Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- Detect strange memory regions and DLLs☆174Updated 3 years ago
- Framework for Adversarial Malware Evaluation.☆33Updated last year
- API Hammering with C++20☆44Updated 2 years ago
- Titan: A crappy Reflective Loader written in C and assembly for Cobalt Strike. Redirects DNS Beacon over DoH☆44Updated 3 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 6 months ago
- An initial proof of concept of a bootkit based on Cr4sh's DMABackdoorBoot☆61Updated last year
- Small visualizator for PE files☆67Updated last year
- Injects shellcode into remote processes using direct syscalls☆74Updated 4 years ago
- Compile shellcode into an exe file from Windows or Linux.☆60Updated 3 years ago
- Experiment on reproducing Obfuscate & Sleep☆141Updated 3 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆52Updated 3 years ago
- Monitors ETW for security relevant syscalls maintaining the set called by each unique process☆70Updated last year
- PINTool to help analyzing malware that uses process injection☆14Updated 3 years ago
- ☆132Updated 2 years ago