vidner / morphLinks
Polymorphic ELF Runtime Crypter written in rust.
☆21Updated 4 years ago
Alternatives and similar repositories for morph
Users that are interested in morph are comparing it to the libraries listed below
Sorting:
- Standalone Metasploit-like XOR encoder for shellcode☆50Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- using the gpu to hide your payload☆62Updated 3 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Simple x86 Trampoline Hook☆43Updated 3 years ago
- ☆29Updated 3 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Updated 2 years ago
- Process Injection without R/W target memory and without creating a remote thread☆19Updated 3 years ago
- Read Memory without ReadProcessMemory for Current Process☆89Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆111Updated 2 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Updated 3 years ago
- Read my blog for more info -☆32Updated 4 years ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆36Updated 2 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Updated 3 years ago
- Hiding your process in ProcessHacker,Task Manager,etc by patching NtQuerySystemInformation☆88Updated 4 years ago
- Simple website to automatically generate string encryption/decryption routines for C#☆10Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- Bypass Malware Time Delays☆107Updated 3 years ago
- ☆72Updated 2 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆23Updated 2 years ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- ☆74Updated last year
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago