Basic packer using XOR encryption
☆31Mar 29, 2024Updated last year
Alternatives and similar repositories for XorPacker
Users that are interested in XorPacker are comparing it to the libraries listed below
Sorting:
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- Making Shellcode fully undetectable using uuid☆23May 7, 2021Updated 4 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- upx变种☆15Aug 2, 2017Updated 8 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Jul 25, 2019Updated 6 years ago
- Simple Packer PE File☆16Mar 8, 2019Updated 6 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆20Jun 16, 2024Updated last year
- Ransomware hello kitty☆23Mar 18, 2021Updated 4 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Nov 26, 2021Updated 4 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Sep 30, 2021Updated 4 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆28Nov 15, 2020Updated 5 years ago
- some ida script☆34Aug 18, 2021Updated 4 years ago
- ☆32Jul 14, 2025Updated 7 months ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!☆72Jun 13, 2024Updated last year
- ☆35Sep 25, 2020Updated 5 years ago
- Persistent & Undetectable Malware Backdoor☆28May 8, 2024Updated last year
- IDA Pro plugin for recognizing known hashes of API function names☆83May 12, 2022Updated 3 years ago
- FF XIV Midiplayer standalone app, for solo and ensemble (Bards of Light)☆11Dec 1, 2025Updated 3 months ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆69Jan 25, 2024Updated 2 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 2 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- LERN GHIDRA☆93Aug 14, 2025Updated 6 months ago
- ☆36Sep 7, 2020Updated 5 years ago
- Experimental examples of Ransomware in different languages☆37Nov 21, 2017Updated 8 years ago
- POC of PPID spoofing using NtCreateUserProcess with syscalls to create a suspended process and performing process injection by overwritti…☆41Sep 23, 2021Updated 4 years ago
- A quick example of the Hells Gate technique in Nim☆94Aug 11, 2021Updated 4 years ago
- 简易定制化DDOS打击工具,可用于自动打击部署☆11May 10, 2023Updated 2 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago