reverserb / Simple_PE_Loader
⚙️ Map and execute EXE in memory
☆10Updated 2 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- Header only library for obfuscation import winapi functions.☆40Updated 3 months ago
- PE Header (.rdata,.data,.text) obsfucation☆38Updated 3 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆21Updated 11 months ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated last year
- A platform independent C++ code obfuscator.☆13Updated 5 years ago
- Process hide tool based on Frost driver☆16Updated 6 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated 2 years ago
- C++ Program used to dump Themida and VMProtect.☆25Updated last year
- Kernel<->Usermode shared memory communcation using manually mapped driver☆19Updated 3 years ago
- stop any process from looking into your process by hooking.☆17Updated last year
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- minimal msvc-windows exclusive lazy importer for C++☆34Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- codecave hook reverse engineering toolkit.☆36Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆35Updated 6 months ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Program to leak anti-virus behaviour and such☆15Updated 6 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆49Updated 3 months ago
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆31Updated 7 months ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- PAGE_GUARD based hooking library☆44Updated 2 years ago
- Elevate arbitrary MSR writes to kernel execution.☆35Updated last year