nnnewb / learning-packer
学习加壳技术的案例代码
☆24Updated 3 years ago
Alternatives and similar repositories for learning-packer:
Users that are interested in learning-packer are comparing it to the libraries listed below
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆27Updated 3 years ago
- 过TP驱动☆29Updated 5 years ago
- 内存加载DLL 支持X86和X64(Memory PELoader Support X86 and X64)☆32Updated last year
- Call NtCreateUserProcess directly as normal.☆68Updated 2 years ago
- https://key08.com/index.php/2021/10/19/1375.html☆65Updated 2 years ago
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆50Updated 4 years ago
- shellcode注入测试工具☆49Updated 5 years ago
- 基于UC的启发式杀毒引擎[还没做完]☆34Updated 3 years ago
- 卓然主动防御源码(可执行文件+完整源码+完整作品报告)☆15Updated 6 years ago
- 简单安排一下 autochk.sys 这个rootkit☆71Updated 2 years ago
- sc4cpp is a shellcode framework based on C++☆88Updated 3 years ago
- Changes handle's access rights using DKOM with a vulnerable driver☆25Updated 7 years ago
- ida提取特征码脚本☆55Updated 5 years ago
- windows rpc 使用MIDL+RPC实现HelloWorld☆22Updated 6 years ago
- 通过重造轮子和调用OpenSSL的方式学习密码!!☆15Updated 2 years ago
- win32kbase!NtDCompositionCommitSynchronizationObject and win32kbase!NtGdiGetCertificate☆16Updated 3 years ago
- 一款linux下的安全产品目的是满足个人安全需求有SSH爆破防护和SYN攻击扫描防护功能,基于netfilter,☆19Updated last year
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆27Updated 2 years ago
- 非编译时代码混淆,包括代码块拆分、代码乱序、常量加密、代码变异、抹除jcc、局部混淆等,主要提供框架以及思路☆30Updated 2 years ago
- Windows CVE主防(HIPS/HIDS)☆54Updated 3 years ago
- 绕过卡巴斯基主动防御,加载 驱动,unhook所有ssdt hook及shadow ssdt hook☆37Updated 9 years ago
- 具备对PE文件添加区段、添加花指令、对代码段加密、修复重定位、加密IAT等功能☆58Updated 5 years ago
- WINDOWS黑客編程技術詳解 [Windows-Hack-Programming backup]☆42Updated 5 years ago
- Windows下的简易进程DLL注入工具 (A simple process DLL injection tool under the Windows)☆26Updated 3 years ago
- 反射式注入☆28Updated 5 years ago
- windwos内核研究与驱动Code☆61Updated 3 years ago
- 保护进程☆18Updated last year
- ☆23Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year