r00tkiter / PE2Shellcode
A gadget for converting PE files to shellcode.
☆12Updated 5 years ago
Alternatives and similar repositories for PE2Shellcode:
Users that are interested in PE2Shellcode are comparing it to the libraries listed below
- Hide Port In Windows☆38Updated 4 months ago
- ☆11Updated 2 years ago
- Convert native dll to shellcode, and support exported function☆22Updated 4 years ago
- 白文件扫描器 非公开☆26Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆16Updated 3 years ago
- PE文件打包器。将一系列的插件dll(寄生dll),打包捆绑到目标exe中,以寄生的方式改变程序的原有行为。寄生的dll完全手动装配,隐藏执行;宿主被恢复后,会被寄生dll强势再感染。☆22Updated 12 years ago
- ☆32Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆33Updated 3 years ago
- Only for research and learning, not for commercial and illegal use☆10Updated 5 years ago
- Windows shellcode encoding and encrypting tool☆21Updated 2 years ago
- Kill Protected Process Light Process (include av)☆56Updated last year
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆59Updated 3 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆29Updated 3 years ago
- vs2019 环境 Gh0st编译通过☆11Updated 3 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Updated last year
- 横向移动三剑客 ( Lateral movement tools)☆29Updated 3 years ago
- Shellcode implementation of Reflective DLL Injection by Golang. Convert DLLs to position independent shellcode☆58Updated 3 years ago
- ☆20Updated 10 months ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆27Updated 3 years ago
- iSwordSDK (Provide Powerful Kernel API For Ring3 Applications)☆15Updated 2 years ago
- shellcode注入测试工具☆49Updated 5 years ago
- Windows Kernel Knowledge && Collect Resources on the wire && Nothing innovation by myself &&☆56Updated 2 months ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆29Updated last year
- PEBFake(修改PEB 伪装当前进程路径、参数等)☆50Updated 4 years ago
- Shellcode异或加密工具☆12Updated 7 years ago
- HTTPS GET RAT and Memory Loader☆25Updated 2 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆42Updated 3 years ago
- ☆17Updated 4 years ago
- Call the CLR interface from memory to load powershell, process-less powershell☆12Updated last year
- 关闭恶意驱动的文件和注册表保护☆12Updated 2 years ago