nqntmqmqmb / pePolymorpherView external linksLinks
A tool implementing process hollowing making your PE polymorphic
☆16Aug 11, 2020Updated 5 years ago
Alternatives and similar repositories for pePolymorpher
Users that are interested in pePolymorpher are comparing it to the libraries listed below
Sorting:
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20May 17, 2023Updated 2 years ago
- An Identity Verification App to be used to for KYC purposes☆15Apr 23, 2018Updated 7 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- Origami Crypter with an updated version of the stub that bypasses windows defender.☆14Mar 13, 2025Updated 11 months ago
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆25Mar 17, 2024Updated last year
- Prevent your binary from being analyzed.☆11Jan 3, 2017Updated 9 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆15Jul 29, 2016Updated 9 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 5 months ago
- ☆13Apr 1, 2017Updated 8 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- The malware is un-killable and fully undetectable by antivirus, developed by Kingsman. It steals the browser passwords, Discord Tokens & …☆61Jul 11, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆45Sep 22, 2019Updated 6 years ago
- Javascript Botnet☆27Aug 14, 2018Updated 7 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- C# DLL Injector written as simple as possible☆18Jul 31, 2021Updated 4 years ago
- Simple example of how to remove all malwares from disk and registry.☆43Jun 13, 2019Updated 6 years ago
- ☆25Apr 30, 2012Updated 13 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Dll injector POC for new handle stealing technique☆21Oct 8, 2017Updated 8 years ago
- Infects PE files with a shellcode☆22Oct 20, 2018Updated 7 years ago
- Inject a .NET assembly into a native process using the CLR Hosting API☆21Apr 28, 2018Updated 7 years ago
- Hide malware behind a legit process C#☆129Mar 1, 2020Updated 5 years ago
- dll embeddable☆17Oct 21, 2020Updated 5 years ago
- Remove a digital signature from DLL, EXE...☆26Sep 11, 2014Updated 11 years ago
- Detect BypassUAC using AMSI☆29Feb 18, 2025Updated 11 months ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆31May 4, 2025Updated 9 months ago