⚙️ Map and execute EXE in memory
☆12Dec 23, 2022Updated 3 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- Process hide tool based on Frost driver☆16Dec 5, 2018Updated 7 years ago
- Looks for a vulnerable entry point to bypass BE Anti Cheat or other in Ring3☆19Feb 25, 2023Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- ☆13Apr 1, 2017Updated 8 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆26Nov 14, 2023Updated 2 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- A simple rootkit to hide a process☆47Jan 10, 2014Updated 12 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆27Jun 28, 2018Updated 7 years ago
- Source code of Claw Key logger previously sold on HackForums☆55Aug 6, 2022Updated 3 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- ☆30Aug 24, 2025Updated 6 months ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- A program for obfuscating C strings☆36Feb 26, 2023Updated 3 years ago
- Execute shellcode via ASPNET compiler☆62Oct 2, 2025Updated 4 months ago
- Encode shellcode into dictionary words for evasion and entropy reduction☆41Dec 12, 2025Updated 2 months ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 4 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- ☆34Mar 3, 2024Updated last year
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Dec 28, 2022Updated 3 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆50May 4, 2025Updated 9 months ago
- Injecting into SELinux-protected system service processes under root on Android.☆50Feb 28, 2024Updated 2 years ago
- Polymorphic Stub Creator☆34Jun 11, 2017Updated 8 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Various Process Injection Techniques☆165Jun 14, 2022Updated 3 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- Anti-Debugging detection and obufuscation techniques that involved the use of Win32 API functions.☆34Apr 4, 2016Updated 9 years ago
- ☆40Jan 11, 2022Updated 4 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- ☆12Jan 21, 2023Updated 3 years ago
- Python Client for Wavefleet☆11Oct 7, 2024Updated last year
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago