vidner / morphLinks
Polymorphic ELF Runtime Crypter written in rust.
☆22Updated 4 years ago
Alternatives and similar repositories for morph
Users that are interested in morph are comparing it to the libraries listed below
Sorting:
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- using the gpu to hide your payload☆62Updated 3 years ago
- Read my blog for more info -☆32Updated 4 years ago
- ☆29Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆28Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Simple x86 Trampoline Hook☆42Updated 3 years ago
- Exploitable drivers, you know what I mean☆153Updated 2 weeks ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆11Updated 2 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- Neutralize KEPServerEX anti-debugging techniques☆32Updated 2 years ago
- NT AUTHORITY\SYSTEM☆41Updated 5 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Scan for potentially vulnerable drivers☆91Updated 3 years ago
- simple user-mode Rootkit☆106Updated 2 years ago
- A journal for $6,000 Riot Vanguard bounty.☆65Updated 2 years ago
- Detours implementation (x64/x86) which used only ntdll import☆89Updated last year
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆24Updated 5 months ago
- Bypass Malware Time Delays☆104Updated 3 years ago