packing-box / packer-masking-toolLinks
Attack tool for altering packed samples so that they evade static packing detection
☆21Updated 10 months ago
Alternatives and similar repositories for packer-masking-tool
Users that are interested in packer-masking-tool are comparing it to the libraries listed below
Sorting:
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- using the gpu to hide your payload☆62Updated 3 years ago
- Compile shellcode into an exe file from Windows or Linux.☆70Updated 5 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- BYOVD Technique Example using viragt64 driver☆61Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 11 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆16Updated last year
- Advanced dynamic malware analysis tool.☆83Updated last year
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆74Updated last year
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆35Updated last year
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆23Updated 7 months ago
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Updated last month
- ☆37Updated 8 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆24Updated last year
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆17Updated 3 years ago
- ☆34Updated last year
- Parent Process ID Spoofing, coded in CGo.☆23Updated 7 months ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Bypass Malware Time Delays☆107Updated 3 years ago
- UAC Bypass using CMSTP in Rust☆33Updated 11 months ago
- OFFZONE 2024 Malware Persistence workshop☆21Updated 11 months ago