nqntmqmqmb / pePolymorpherLinks
A tool implementing process hollowing making your PE polymorphic
☆16Updated 5 years ago
Alternatives and similar repositories for pePolymorpher
Users that are interested in pePolymorpher are comparing it to the libraries listed below
Sorting:
- Fud Runpe Av Evasion / All Av Bypass☆32Updated 2 years ago
- Bypassing windows uac, however its an old approach/method but its still unpatched ¯\_(ツ)_/¯☆43Updated 3 years ago
- Injecting shellcode into a process memory and executing it in C#☆53Updated 2 years ago
- A rework of CMLuaUtil AutoElevated☆27Updated 2 years ago
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆90Updated 2 years ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆36Updated 2 years ago
- Криптор на шелл-кодах☆11Updated 5 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆37Updated 5 years ago
- Load static-compiled PE from remote server.☆65Updated 3 years ago
- My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.☆78Updated last year
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- Halos Gate-based NTAPI Unhooker☆51Updated 3 years ago
- simple user-mode Rootkit☆105Updated 2 years ago
- A small shellcode loader library written in C#☆47Updated 3 years ago
- A small NtCreateUserProcess PoC that spawns a Command prompt.☆99Updated 3 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆82Updated 3 years ago
- NanoCore rat stub source code☆38Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆106Updated 2 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆174Updated 2 years ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆60Updated 2 years ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆135Updated 3 years ago
- Single stub direct and indirect syscalling with runtime SSN resolving for windows.☆139Updated 3 years ago
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆63Updated 2 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43Updated last year
- Akame is an open-source, shellcode loader written in C++17☆20Updated 5 months ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Hide malware behind a legit process C#☆125Updated 5 years ago
- Patch AMSI and ETW in remote process via direct syscall☆83Updated 3 years ago