vic4key / QLoaderLinks
QLoader is a PE loader creator that helps you quickly create a non-exe loader for application
☆107Updated 10 months ago
Alternatives and similar repositories for QLoader
Users that are interested in QLoader are comparing it to the libraries listed below
Sorting:
- Easy XOR string encryption for NET based binaries☆139Updated last year
- A DLL Injection Detector for Windows☆66Updated last month
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- A dynamic unpacking tool☆137Updated last year
- A simple commandline application to automatically decrypt strings from Obfuscator protected binaries☆46Updated last year
- Create a new thread that will suspend every thread and encrypt its stack, then going to sleep , then decrypt the stacks and resume thread…☆161Updated 2 years ago
- Read Memory without ReadProcessMemory for Current Process☆76Updated 3 years ago
- UPX - the Ultimate Packer for eXecutables☆70Updated 3 years ago
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆78Updated last month
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆110Updated last year
- x86/x64 Ring 0/-2 System Freezer/Debugger☆118Updated 2 months ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆219Updated 2 years ago
- ☆114Updated 3 years ago
- Standalone Metasploit-like XOR encoder for shellcode☆47Updated last year
- A string obfuscator for .NET apps, built to evade static string analysis.☆106Updated 2 years ago
- Collection of DLL function export forwards for DLL export function proxying☆102Updated last year
- Process Injection via Component Object Model (COM) IRundown::DoCallback().☆60Updated 2 years ago
- HEVD Exploit: ArbitraryWrite on Windows 10 22H2 - Bypassing KVA Shadow and SMEP via PML4 Entry Manipulation☆32Updated last year
- A PE (Portable Executable) packer with Huffman Compression and Xor encryption.☆64Updated 3 years ago
- A fast method to intercept syscalls from any user-mode process using InstrumentationCallback and detect any process using Instrumentation…☆31Updated last year
- Detours implementation (x64/x86) which used only ntdll import☆90Updated last year
- Think APIMonitor, but for .NET binaries.☆57Updated 2 years ago
- Exploitable drivers, you know what I mean☆151Updated last year
- This script is used to unload PsSetCreateProcessNotifyRoutineEx, PsSetCreateProcessNotifyRoutine, PsSetLoadImageNotifyRoutine and PsSetCr…☆63Updated last year
- shellcode-loaders and beacon-loaders☆70Updated last year
- Herpaderply Hollowing - a PE injection technique, hybrid between Process Hollowing and Process Herpaderping☆63Updated 2 years ago
- Detects virtual machines and malware analysis environments☆135Updated 2 years ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- An x86-64 code virtualizer for VM based obfuscation☆128Updated 7 months ago
- A tool for detecting manual/direct syscalls in x86 and x64 processes using Nirvana Hooks.☆113Updated 3 years ago