vic4key / QLoaderLinks
QLoader is a PE loader creator that helps you quickly create a non-exe loader for application
☆113Updated last year
Alternatives and similar repositories for QLoader
Users that are interested in QLoader are comparing it to the libraries listed below
Sorting:
- A dynamic unpacking tool☆145Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆166Updated 2 years ago
- Collection of DLL function export forwards for DLL export function proxying☆107Updated 5 months ago
- Easy XOR string encryption for NET based binaries☆140Updated 2 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆112Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆225Updated 2 years ago
- A DLL Injection Detector for Windows.☆76Updated 3 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated 3 months ago
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆47Updated last year
- XOR decrypting shellcode using the GPU with OpenCL.☆120Updated 8 months ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆81Updated 7 months ago
- Kernel Mode Driver for Elevating Process Privileges☆134Updated 2 years ago
- shellcode-loaders and beacon-loaders☆72Updated 2 years ago
- ☆118Updated 3 years ago
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆64Updated 3 years ago
- Windows API Call Obfuscation☆112Updated 3 years ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆116Updated 4 years ago
- Hook all callbacks which are registered with LdrRegisterDllNotification☆96Updated 10 months ago
- A string obfuscator for .NET apps, built to evade static string analysis.☆111Updated 3 years ago
- Block any Process to open HANDLE to your process , only SYTEM is allowed to open handle to your process ,with that you can avoid remote m…☆172Updated 2 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆201Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Dynamically generated obfuscated jumps and/or function calls☆38Updated 2 years ago
- simple user-mode Rootkit☆108Updated 3 years ago
- Header only library for obfuscation import winapi functions.☆43Updated 11 months ago
- Code used in this post https://captmeelo.com/redteam/maldev/2022/04/21/kernelcallbacktable-injection.html☆140Updated 3 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- Reimplement CreateProcessInternalW via Windows 10 20H1+/Windows 11 Base on NtCreateUserProcess-Post☆77Updated last year