packing-box / packer-masking-toolLinks
Attack tool for altering packed samples so that they evade static packing detection
☆18Updated 4 months ago
Alternatives and similar repositories for packer-masking-tool
Users that are interested in packer-masking-tool are comparing it to the libraries listed below
Sorting:
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated last year
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Antivirus killer using ring-0 kernel driver. Antivirus processes will automatically close while the killer is running.☆6Updated 2 years ago
- PoC for the Untrusted Pointer Dereference in the appid.sys driver☆16Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- ☆25Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- WinREPL is a "read-eval-print loop" shell on Windows that is useful for testing/learning x86 and x64 assembly.☆16Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- using the gpu to hide your payload☆58Updated 2 years ago
- ☆39Updated last year
- IDA Python scripts☆36Updated last month
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆76Updated last month
- ☆30Updated 6 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- This repo for Windows x32-x64 Kernel/Driver/User Mode Exploitation writeups and exploits☆24Updated last year
- Youtube channel sample code☆49Updated 2 weeks ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59Updated 2 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆21Updated 7 months ago
- BYOVD Technique Example using viragt64 driver☆40Updated 10 months ago
- Signature finder (from PE-bear)☆36Updated last month
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆30Updated 9 months ago
- General malware analysis stuff☆37Updated 9 months ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- ☆38Updated 3 months ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆28Updated 10 months ago
- 🗡️ A multi-user malleable C2 framework targeting Windows. Written in C++ and Python☆45Updated last year
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆24Updated 2 years ago