reverserb / Simple_PE_LoaderLinks
⚙️ Map and execute EXE in memory
☆11Updated 2 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- A platform independent C++ code obfuscator.☆13Updated 6 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆22Updated last year
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- Header only library for obfuscation import winapi functions.☆42Updated 6 months ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- Simple API Hooks detector☆72Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆36Updated 2 years ago
- what the fuck is this shit☆25Updated 9 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 4 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆30Updated 4 years ago
- Exploit MsIo vulnerable driver☆112Updated 4 years ago
- Скрытие Win API☆27Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- PAGE_GUARD based hooking library☆48Updated 3 years ago
- Obfuscate calls to imports by patching in stubs☆70Updated 4 years ago
- A very weird RAT☆19Updated 3 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆28Updated 3 years ago
- proof of concept of user-mode anti-breakpoint technique☆16Updated last year
- codecave hook reverse engineering toolkit.☆37Updated last year
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Bypassing kernel patch protection runtime☆21Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- Hardware ID☆53Updated 3 years ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆23Updated 3 years ago
- A simple Windows kernel rootkit.☆92Updated 3 months ago
- stop any process from looking into your process by hooking.☆20Updated last year
- Infects PE files with a shellcode☆19Updated 6 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆25Updated last year