reverserb / Simple_PE_Loader
⚙️ Map and execute EXE in memory
☆10Updated 2 years ago
Alternatives and similar repositories for Simple_PE_Loader:
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆13Updated 5 years ago
- Overwrite MBR and add own custom message☆16Updated 4 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆24Updated 5 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆18Updated 2 years ago
- A manual PE mapping implementation, aka reflective loader☆18Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆26Updated last year
- C++ Class with various techniques to detect the execution in a virtualized environment☆12Updated 10 months ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- A very weird RAT☆19Updated 2 years ago
- Header only library for obfuscation import winapi functions.☆40Updated last month
- An implementation of the Process Hollowing technique.☆16Updated 4 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆19Updated 9 months ago
- minimal msvc-windows exclusive lazy importer for C++☆33Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆106Updated last year
- PAGE_GUARD based hooking library☆42Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆35Updated last year
- ☆12Updated 4 years ago
- ZeroImport is a lightweight and easy to use C++ library for Windows Kernel Drivers. It allows you to hide any import in your kernel drive…☆48Updated 2 years ago
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆56Updated last year
- Simple PE Packer Which Encrypts .text Section☆51Updated 7 years ago
- codecave hook reverse engineering toolkit.☆37Updated last year
- Obfuscate calls to imports by patching in stubs☆67Updated 3 years ago
- stop any process from looking into your process by hooking.☆16Updated 11 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆31Updated 5 months ago
- Kernel<->Usermode shared memory communcation using manually mapped driver☆14Updated 3 years ago