reverserb / Simple_PE_LoaderLinks
⚙️ Map and execute EXE in memory
☆13Updated 3 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆23Updated 2 years ago
- Simple API Hooks detector☆76Updated 3 years ago
- A simple Windows kernel rootkit.☆96Updated 8 months ago
- Compact MBR Bootkit for Windows☆52Updated 4 years ago
- Scan for potentially vulnerable drivers☆94Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 3 years ago
- spoof return address☆79Updated 2 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 11 months ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆30Updated 3 years ago
- stop any process from looking into your process by hooking.☆21Updated last year
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago
- kernel to user mode APC injector☆46Updated 3 years ago
- Recursive and arbitrary code execution at kernel-level without a system thread creation☆157Updated 2 years ago
- windows rootkit☆60Updated last year
- simple user-mode Rootkit☆107Updated 3 years ago
- Exploit MsIo vulnerable driver☆123Updated 4 years ago
- Bring Your Own Vulnerable Driver for PatchGuard & Driver Signature Enforcement☆14Updated last year
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆62Updated 2 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆38Updated 2 years ago
- stack based arithmetic only virtual machine (VM) executes bytecode instructions to perform various basic arithmetic operations and manage…☆26Updated 10 months ago
- Header only library for obfuscation import winapi functions.☆43Updated 11 months ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Updated 3 years ago
- 2022 Updated Kernelmode-Code☆33Updated last year
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago