nqntmqmqmb / xorPacker
A simple packer working with all PE files which cipher your exe with a XOR implementation
☆14Updated 4 years ago
Alternatives and similar repositories for xorPacker:
Users that are interested in xorPacker are comparing it to the libraries listed below
- Process Hollowing POC in CPP☆15Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Another Portable Executable files analysing stuff☆21Updated 13 years ago
- Remote PE reflective injection with a simple reflective loader☆31Updated 5 years ago
- ☆12Updated 4 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- ☆16Updated 3 years ago
- ☆7Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Updated 4 years ago
- A repository filled with ideas to break/detect direct syscall techniques☆27Updated 3 years ago
- An example of COM hijacking using a proxy DLL.☆28Updated 3 years ago
- really ?☆12Updated last year
- Manually perform syscalls without going through any external API or DLL.☆18Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆32Updated 3 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆26Updated last year
- Non organized Cpp code files I used for my research on Windows☆22Updated 4 years ago
- ☆15Updated 4 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Clone running process with ZwCreateProcess☆57Updated 4 years ago
- Process Injection: APC Injection☆29Updated 4 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Updated 3 years ago
- C code to enable ETW tracing for Dotnet Assemblies☆31Updated 2 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆20Updated 2 months ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆18Updated 2 years ago
- Execute an arbitrary command within the context of another process☆20Updated 5 years ago