reverserb / Simple_PE_LoaderLinks
⚙️ Map and execute EXE in memory
☆12Updated 2 years ago
Alternatives and similar repositories for Simple_PE_Loader
Users that are interested in Simple_PE_Loader are comparing it to the libraries listed below
Sorting:
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- ☆26Updated last year
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- A C++17 framework designed to enable obfuscation of constants, variables, and strings.☆22Updated last year
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆43Updated last year
- Header only library for obfuscation import winapi functions.☆43Updated 8 months ago
- Listing UDP connections with remote address without sniffing.☆29Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Updated 2 years ago
- Compact MBR Bootkit for Windows☆54Updated 3 years ago
- Using c++23 compile-time magic to produce obfuscated PIC strings and arrays.☆30Updated last year
- SetWinEventHook Sample☆49Updated 2 years ago
- Simple API Hooks detector☆75Updated 3 years ago
- Signature finder (from PE-bear)☆38Updated 2 months ago
- POC Ring3 Windows Rootkit (x86 / x64) - Hide processes and files☆59Updated 2 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆22Updated last year
- simple user-mode Rootkit☆107Updated 3 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 6 years ago
- ntoskrnl .data hooks for UM-KM communication☆51Updated last year
- kernel to user mode APC injector☆44Updated 3 years ago
- kASLR bypass technique on Intel CPUs.☆30Updated 5 months ago
- Scan for potentially vulnerable drivers☆92Updated 3 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Updated last year
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆62Updated last year
- Research into removing strings & API call references at compile-time (Anti-Analysis)☆27Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆89Updated 2 weeks ago
- stop any process from looking into your process by hooking.☆21Updated last year
- A platform independent C++ code obfuscator.☆13Updated 6 years ago
- SysCaller: SDK for WindowsAPI via syscalls. Dynamic Resolution, Obfuscation, Multi-Language Bindings, & more!☆49Updated last week
- Win64 UEFI Driver-based tool for unrestricted memory R/W☆29Updated 3 years ago