reverserb / Simple_PE_LoaderLinks
⚙️ Map and execute EXE in memory
☆11Updated 2 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- A platform independent C++ code obfuscator.☆13Updated 5 years ago
- stop any process from looking into your process by hooking.☆21Updated last year
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 6 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆23Updated last year
- Overwrite MBR and add own custom message☆17Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- Dynamically generated obfuscated jumps and/or function calls☆36Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆25Updated last year
- Infects PE files with a shellcode☆19Updated 6 years ago
- Header only library for obfuscation import winapi functions.☆41Updated 5 months ago
- ☆13Updated 4 years ago
- A simple direct syscall wrapper written in C++ with compatibility for x86 and x64 programs.☆53Updated 5 months ago
- Inject dll to explorer.exe and hide file from process.☆21Updated 4 years ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- Process hide tool based on Frost driver☆16Updated 6 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 5 years ago
- x64 Windows privilege elevation using anycall☆21Updated 4 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆42Updated 8 months ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆28Updated 3 years ago